We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
Reserved 2024-01-08 | Published 2024-02-09 | Updated 2024-09-20 | Assigner ibmCWE-327 Use of a Broken or Risky Cryptographic Algorithm
www.ibm.com/support/pages/node/7116091
exchange.xforce.ibmcloud.com/vulnerabilities/279091
packetstormsecurity.com/...ions-Remote-Credential-Theft.html
seclists.org/fulldisclosure/2024/Feb/7
Support options