CVE-2021-39057

8.1 HIGH

📋 TL;DR

CVE-2021-39057 is a server-side request forgery (SSRF) vulnerability in IBM Spectrum Protect Plus that allows authenticated attackers to make unauthorized requests from the vulnerable server. This could enable network scanning, internal service enumeration, or facilitate other attacks. Organizations running affected versions of IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x are impacted.

💻 Affected Systems

Products:
  • IBM Spectrum Protect Plus
Versions: 10.1.0.0 through 10.1.8.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All deployments within the affected version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could pivot through the vulnerable server to access internal systems, exfiltrate sensitive data, or use the server as a proxy for attacks against other internal resources.

🟠

Likely Case

Network enumeration of internal systems, scanning for open ports/services, and potential information disclosure about internal network architecture.

🟢

If Mitigated

Limited impact if network segmentation restricts the vulnerable server's access to only necessary internal resources and proper authentication controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities are typically straightforward to exploit once the attack vector is identified. Requires authenticated access to the IBM Spectrum Protect Plus interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.9 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/6525346

Restart Required: Yes

Instructions:

1. Download IBM Spectrum Protect Plus version 10.1.9 or later from IBM Fix Central. 2. Apply the update following IBM's upgrade documentation. 3. Restart the Spectrum Protect Plus services to complete the installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from the Spectrum Protect Plus server to only necessary destinations using firewall rules.

Access Control

all

Implement strict authentication and authorization controls to limit who can access the Spectrum Protect Plus interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit the server's outbound connections
  • Enforce strong authentication and monitor for suspicious SSRF patterns in logs

🔍 How to Verify

Check if Vulnerable:

Check the IBM Spectrum Protect Plus version via the administrative interface or by examining installation logs. Versions 10.1.0.0 through 10.1.8.x are vulnerable.

Check Version:

Check the version in the Spectrum Protect Plus web interface under Help > About, or examine the installation directory for version files.

Verify Fix Applied:

Verify the version is 10.1.9 or later and test that SSRF attempts are blocked or properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from the Spectrum Protect Plus server
  • Requests to internal IP addresses or unusual domains
  • Authentication logs showing suspicious user activity

Network Indicators:

  • Unexpected outbound connections from the Spectrum Protect Plus server to internal systems
  • Port scanning activity originating from the server

SIEM Query:

source="spectrum_protect_plus" AND (url:*internal* OR url:*192.168* OR url:*10.* OR url:*172.16*)

🔗 References

📤 Share & Export