CVE-2016-2861
Published on: 07/02/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:15 PM UTC
Certain versions of Websphere Extreme Scale from Ibm contain the following vulnerability:
IBM WebSphere eXtreme Scale 7.1.0 before 7.1.0.3, 7.1.1 before 7.1.1.1, 8.5 before 8.5.0.3, and 8.6 before 8.6.0.8 does not properly encrypt data, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
- CVE-2016-2861 has been assigned by
[email protected] to track the vulnerability - currently rated as LOW severity.
CVSS3 Score: 3.7 - LOW
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | HIGH | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | LOW | NONE | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
PI60897: WebSphere eXtreme Scale is subject to HTTP response splitting attacks. | www-01.ibm.com text/html |
![]() |
PI60898: WebSphere eXtreme Scale is subject to HTTP response splitting attacks. | www-01.ibm.com text/html |
![]() |
Security Bulletin: Multiple vulnerabilities in IBM WebSphere eXtreme Scale Client could expose sensitive information (CVE-2016-2861, CVE-2016-0400) | Patch Vendor Advisory www-01.ibm.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Ibm | Websphere Extreme Scale | 7.1.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 7.1.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 7.1.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.3 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.4 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.5 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.6 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.7 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 7.1.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 7.1.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 7.1.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.5.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.0 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.1 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.2 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.3 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.4 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.5 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.6 | All | All | All |
Application | Ibm | Websphere Extreme Scale | 8.6.0.7 | All | All | All |
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.3:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.4:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.6:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.7:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:7.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.3:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.4:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.6:*:*:*:*:*:*:*:
- cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.7:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE