CVE-2021-20360

7.5 HIGH

📋 TL;DR

IBM Cloud Pak for Applications 4.3 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects organizations running vulnerable versions of IBM Cloud Pak for Applications, potentially exposing encrypted data.

💻 Affected Systems

Products:
  • IBM Cloud Pak for Applications
Versions: 4.3
Operating Systems: All platforms running IBM Cloud Pak for Applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default cryptographic configuration in IBM Cloud Pak for Applications 4.3

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt highly sensitive information including credentials, configuration data, and application secrets, leading to complete system compromise.

🟠

Likely Case

Attackers decrypt stored sensitive data, gaining unauthorized access to application information and potentially escalating privileges.

🟢

If Mitigated

With proper encryption controls and network segmentation, impact is limited to specific encrypted data sets rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to encrypted data and knowledge of weak cryptographic implementation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix from IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/6471271

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin. 2. Apply recommended fix or upgrade. 3. Restart affected services. 4. Verify cryptographic algorithms are updated.

🔧 Temporary Workarounds

Update Cryptographic Configuration

all

Manually configure stronger cryptographic algorithms in IBM Cloud Pak for Applications

Refer to IBM documentation for cryptographic configuration updates

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Monitor for unusual decryption activities and access patterns

🔍 How to Verify

Check if Vulnerable:

Check IBM Cloud Pak for Applications version and review cryptographic configuration settings

Check Version:

oc get pods -n openshift-operators | grep ibm-cp4a-operator

Verify Fix Applied:

Verify updated cryptographic algorithms are in use and check IBM fix application status

📡 Detection & Monitoring

Log Indicators:

  • Unusual decryption activities
  • Access to encrypted data stores outside normal patterns

Network Indicators:

  • Traffic patterns suggesting cryptographic attacks
  • Unusual data extraction from encrypted stores

SIEM Query:

Search for decryption events or cryptographic algorithm usage in application logs

🔗 References

📤 Share & Export