does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability now. Product(s)Version(s)Remediation/Fix/InstructionsTransformation Extender Advanced10.0.x 10.0.1.11 https://www.ibm.com/support/fixcentral/swg/selectFixes Transformation Extender Advanced10.0.x 10.0.2.0 https://www.ibm.com/support/fixcentral/swg/selectFixes
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7246885 |
|
Wed, 01 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Transformation Extender Advanced 10.0.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. | |
| Title | IBM Transformation Extender Advanced information disclosure | |
| First Time appeared |
Ibm
Ibm transformation Extender Advanced |
|
| Weaknesses | CWE-521 | |
| CPEs | cpe:2.3:a:ibm:transformation_extender_advanced:10.0.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Ibm
Ibm transformation Extender Advanced |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-10-01T17:19:51.779Z
Reserved: 2023-12-01T01:47:32.863Z
Link: CVE-2023-49883
Updated: 2025-10-01T17:19:48.284Z
Status : Analyzed
Published: 2025-10-01T17:15:37.643
Modified: 2025-10-03T17:38:45.517
Link: CVE-2023-49883
No data.
OpenCVE Enrichment
No data.