IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to perform unauthorized actions using man in the middle techniques due to improper certificate validation.
History

Wed, 03 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:*

Tue, 02 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Sep 2025 14:30:00 +0000

Type Values Removed Values Added
Description IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to perform unauthorized actions using man in the middle techniques due to improper certificate validation.
Title IBM Concert Software information disclosure
First Time appeared Ibm
Ibm concert
Weaknesses CWE-295
CPEs cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:concert:1.1.0:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm concert
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published: 2025-09-01T14:19:45.777Z

Updated: 2025-09-02T20:26:00.195Z

Reserved: 2025-04-15T17:50:40.774Z

Link: CVE-2025-33099

cve-icon Vulnrichment

Updated: 2025-09-02T20:25:55.256Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-01T15:15:35.030

Modified: 2025-09-03T16:04:38.267

Link: CVE-2025-33099

cve-icon Redhat

No data.