{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T14:52:39.056","vulnerabilities":[{"cve":{"id":"CVE-2018-1652","sourceIdentifier":"psirt@us.ibm.com","published":"2018-12-11T16:29:00.467","lastModified":"2024-11-21T04:00:08.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM DataPower Gateway 7.1.0.0 through 7.1.0.19, 7.2.0.0 through 7.2.0.16, 7.5.0.0 through 7.5.0.10, 7.5.1.0 through 7.5.1.9, 7.5.2.0 through 7.5.2.9, and 7.6.0.0 through 7.6.0.2 and IBM MQ Appliance 8.0.0.0 through 8.0.0.8 and 9.0.1 through 9.0.5 could allow a local user to cause a denial of service through unknown vectors. IBM X-Force ID: 144724."},{"lang":"es","value":"IBM DataPower Gateway desde la versión 7.1.0.0 hasta la 7.1.0.19, desde la 7.2.0.0 hasta la 7.2.0.16, desde la 7.5.0.0 hasta la 7.5.0.10, desde la 7.5.1.0 hasta la 7.5.1.9, desde la 7.5.2.0 hasta la 7.5.2.9 y desde la 7.6.0.0 hasta la 7.6.0.2 e IBM MQ Appliance desde la versión 8.0.0.0 hasta la 8.0.0.8 y desde la 9.0.1 hasta la 9.0.5 podrían permitir a un usuario local provocar una denegación de servicio (DoS) mediante vectores desconocidos. IBM X-Force ID: 144724."}],"metrics":{"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0.0","versionEndIncluding":"7.1.0.19","matchCriteriaId":"799BC488-8D13-49F5-8538-FD691728890E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0.0","versionEndIncluding":"7.2.0.16","matchCriteriaId":"5D1B2B51-6930-4587-9C42-485D3BE46430"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.5.0.0","versionEndIncluding":"7.5.0.10","matchCriteriaId":"D2887923-DAF8-41F5-8A7F-CCC151B5AF6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.5.1.0","versionEndIncluding":"7.5.1.9","matchCriteriaId":"21D7E9B5-4968-4783-B684-FB8F1236B303"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.5.2.0","versionEndIncluding":"7.5.2.9","matchCriteriaId":"D7BB6E84-A488-45B4-AD19-960107B6D263"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0.0","versionEndIncluding":"7.6.0.2","matchCriteriaId":"7A330B99-98A7-4427-A7D0-070921E2395B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0.0","versionEndIncluding":"8.0.0.8","matchCriteriaId":"9F6BC780-8BF2-49D9-A374-51AEEF556EC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*","versionStartIncluding":"9.0.1","versionEndIncluding":"9.0.5","matchCriteriaId":"0FD0DF7E-38EF-4658-B8A3-F195543D577C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/144724","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10717483","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10744557","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/144724","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10717483","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10744557","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}