CVE-2020-4965

📊 7.5 HIGH0.1%🎯 0 exploits
📅 Published Apr 12, 2021
📋 Status: Modified

IBM Jazz Team Server products use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192422.

🎯 Affected Products & Systems

38 product configurations affected

Filter by type:
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
38 productsscroll for more
Metrics
7.5 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
NONE
Availability:
NONE
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
7.5 (HIGH)v3.1
EPSS Details
0.1% (Minimal)30.2th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 12, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1
References3