Medium
IBM Sterling Secure Proxy contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
IBM Sterling Secure Proxy uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
IBM Sterling Secure Proxy uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
IBM
Refer to IBM Security Bulletin 6484681 for the patch, upgrade, or suggested workaround information.