{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T10:37:06.135","vulnerabilities":[{"cve":{"id":"CVE-2021-20565","sourceIdentifier":"psirt@us.ibm.com","published":"2021-05-14T17:15:07.813","lastModified":"2024-11-21T05:46:47.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Cloud Pak for Security (CP4S) 1.4.0.0, 1.5.0.0, 1.5.0.1, 1.6.0.0, and 1.6.0.1 uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. IBM X-Force ID: 199236."},{"lang":"es","value":"IBM Cloud Pak for Security (CP4S) versiones 1.4.0.0, 1.5.0.0, 1.5.0.1, 1.6.0.0 y 1.6.0.1, usa un mecanismo de protección que se basa en la existencia o valores de entrada, pero la entrada puede ser modificada por un actor no confiable en una forma que omite el mecanismo de protección. IBM X-Force ID: 199236"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:cloud_pak_for_security:1.4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"EC0F9319-4D8A-472B-B3D4-6B84009AC7C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"43F0280B-81B4-49A1-BE7E-D8476C20E041"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"99B17CED-AAD2-4CC0-A69F-F6868BE4E45E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"29021B22-B70A-4278-AB13-92794BB260C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:cloud_pak_for_security:1.6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"47D34FF2-60DC-4EE0-836B-B7ED1C5F8326"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/199236","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6453115","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/199236","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6453115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}