CVE-2014-6120

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on IBM Rational AppScan Source and Security AppScan Source installation servers via unspecified vectors. Attackers can gain full control of affected servers, potentially compromising the entire application security testing infrastructure. Organizations using vulnerable versions of these IBM application security testing products are affected.

💻 Affected Systems

Products:
  • IBM Rational AppScan Source
  • IBM Security AppScan Source
Versions: Rational AppScan Source 8.0-8.0.0.2, 8.5-8.5.0.1; Security AppScan Source 8.6-8.6.0.2, 8.7-8.7.0.1, 8.8, 9.0-9.0.0.1, 9.0.1
Operating Systems: Windows (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the installation server component; all default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the AppScan server, allowing attackers to execute arbitrary commands with system-level privileges, steal sensitive application security data, pivot to other systems, and deploy ransomware or other malware.

🟠

Likely Case

Attackers gain remote code execution on the AppScan server, enabling them to steal source code analysis results, modify security findings, and potentially access credentials stored in the system.

🟢

If Mitigated

Limited impact if server is isolated in a secure network segment with strict access controls, though the vulnerability still provides a foothold for lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

IBM X-Force ID 96721 indicates unspecified vectors but CVSS 9.8 suggests trivial exploitation; no public exploit code found.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM fix packs: Rational AppScan Source 8.0.0.3+, 8.5.0.2+; Security AppScan Source 8.6.0.3+, 8.7.0.2+, 8.8.0.1+, 9.0.0.2+, 9.0.1.1+

Vendor Advisory: https://exchange.xforce.ibmcloud.com/vulnerabilities/96721

Restart Required: Yes

Instructions:

1. Download appropriate fix pack from IBM Fix Central. 2. Backup current installation. 3. Apply fix pack following IBM instructions. 4. Restart AppScan services. 5. Verify installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate AppScan servers from untrusted networks and restrict access to authorized IPs only.

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" port port="<AppScan_port>" protocol="tcp" accept'
netsh advfirewall firewall add rule name="AppScan_Access" dir=in action=allow protocol=TCP localport=<AppScan_port> remoteip=192.168.1.0/24

Service Account Hardening

windows

Run AppScan services with minimal privileges to limit impact of command execution.

sc config "AppScanService" obj="NT AUTHORITY\LocalService"
Set-Service -Name "AppScanService" -StartupType "Automatic" -Credential (Get-Credential)

🧯 If You Can't Patch

  • Immediately isolate affected servers in a dedicated VLAN with strict firewall rules allowing only necessary traffic
  • Implement application-level firewall or WAF with command injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Help > About in AppScan GUI or run 'AppScan.exe -version' from command line and compare with affected versions list.

Check Version:

AppScan.exe -version

Verify Fix Applied:

Verify version number is above patched threshold and test command injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from AppScan service
  • Suspicious command execution patterns in Windows Event Logs (4688)
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unexpected outbound connections from AppScan server
  • Command and control traffic patterns
  • Anomalous payloads in HTTP requests to AppScan

SIEM Query:

source="windows" EventCode=4688 AND (NewProcessName="cmd.exe" OR NewProcessName="powershell.exe") AND ProcessName="*AppScan*"

🔗 References

📤 Share & Export