{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T05:51:03.055","vulnerabilities":[{"cve":{"id":"CVE-2021-29753","sourceIdentifier":"psirt@us.ibm.com","published":"2021-11-05T18:15:09.253","lastModified":"2024-11-21T06:01:44.517","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Business Automation Workflow 18. 19, 20, 21, and IBM Business Process Manager 8.5 and d8.6 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval."},{"lang":"es","value":"IBM Business Automation Workflow versiones 18. 19, 20, 21, e IBM Business Process Manager 8.5 y d8.6, transmite o almacena credenciales de autenticación, pero usa un método no seguro que es susceptible de ser interceptado y/o recuperado sin autorización"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-319"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*","matchCriteriaId":"F6ED3777-F79B-4A0E-8E25-6721C61B54F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:19.0.0.0:*:*:*:-:*:*:*","matchCriteriaId":"535AE550-01A0-447C-8894-64A93C63047C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.0:*:*:*:-:*:*:*","matchCriteriaId":"04F6CF36-B3C9-41F3-8A2F-B2E8C4FD888F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:21.0.0.0:*:*:*:-:*:*:*","matchCriteriaId":"4716C07D-A372-47CC-BDE8-FEBBC8EDB919"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:-:*:*:*","matchCriteriaId":"2E9CEC39-C2BF-4F43-86AD-4BFBB4915DE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*","matchCriteriaId":"6DE7BCD3-C969-4248-B325-8EAAE9959797"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/201919","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6513703","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/201919","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6513703","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}