CVE-2020-4965
📊 7.5 HIGH⚡ 0.1%🎯 0 exploits
📅 Published Apr 12, 2021
📋 Status: Modified
IBM Jazz Team Server products use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192422.
CVSS v3.1 • NVD
🎯 Affected Products & Systems
38 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | ibm | collaborative lifecycle management | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | collaborative lifecycle management | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | collaborative lifecycle management | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
38 products•scroll for more
Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
NONE
Availability:
NONE
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
ModifiedCVSS Details
7.5 (HIGH)v3.1
Source: [email protected]
EPSS Details
0.1% (Minimal)30.2th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 12, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1
CWE-327
References3
NVDpatchadvisory