CVE-2014-0869
The decrypt function in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics does not require a key, which makes it easier for remote attackers to obtain cleartext passwords by sniffing the network and then providing a string argument to this function.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.1852 (18.5%)
Percentile: 95.3%
EPSS: 2026-05-06
Affects
ibm:algo_credit_limitsibm:algorithmicsTechnical description
The decrypt function in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics does not require a key, which makes it easier for remote attackers to obtain cleartext passwords by sniffing the network and then providing a string argument to this function.
Published: 7/7/2014, 11:01:28 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html
- http://seclists.org/fulldisclosure/2014/Jun/173
- http://www-01.ibm.com/support/docview.wss?uid=swg21675881
- http://www.securityfocus.com/archive/1/532598/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90943
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140630-0_IBM_Algorithmics_RICOS_multiple_vulnerabilities_v10.txt
- http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html
- http://seclists.org/fulldisclosure/2014/Jun/173