Weak Cryptographic Algorithms in IBM GSKit (IBM DB2) - Vulnerability in Data Encryption

Weak Cryptographic Algorithms in IBM GSKit (IBM DB2) - Vulnerability in Data Encryption

CVE-2018-1428 · LOW Severity

AV:L/AC:L/AU:N/C:P/I:N/A:N

IBM GSKit (IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 139073.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.