CVE-2022-33954

4.6 MEDIUM

📋 TL;DR

This vulnerability in IBM Robotic Process Automation allows users with physical access to systems to obtain sensitive information due to insufficient credential protection. It affects IBM RPA versions 21.0.1 through 21.0.3. Attackers could access credentials stored insecurely on the system.

💻 Affected Systems

Products:
  • IBM Robotic Process Automation
Versions: 21.0.1, 21.0.2, 21.0.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical access to the system where IBM RPA is installed. The vulnerability exists in how credentials are stored and protected locally.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could extract administrative credentials, potentially gaining full control over the RPA environment and accessing sensitive business data processed by automation workflows.

🟠

Likely Case

An insider or unauthorized person with physical access could obtain service account credentials, allowing them to access RPA components and potentially manipulate automation processes.

🟢

If Mitigated

With proper physical security controls and credential management, the risk is limited to authorized personnel who already have legitimate access to the system.

🌐 Internet-Facing: LOW - This vulnerability requires physical access to the system, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Physical access requirements mean this primarily affects internal environments, but proper physical security can mitigate the risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical access to the system. The vulnerability involves accessing insufficiently protected credential storage locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix pack for version 21.0.3 or upgrade to later versions

Vendor Advisory: https://www.ibm.com/support/pages/node/6608458

Restart Required: Yes

Instructions:

1. Review IBM advisory at the provided URL. 2. Apply the appropriate fix pack for your version. 3. Restart affected services. 4. Verify credential storage is now properly protected.

🔧 Temporary Workarounds

Enhance Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized access to systems running IBM RPA.

Credential Storage Review

all

Audit and secure all credential storage locations used by IBM RPA on affected systems.

🧯 If You Can't Patch

  • Implement strict physical security controls and access monitoring for systems running IBM RPA
  • Regularly audit and rotate credentials stored by IBM RPA, and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM RPA version using the Control Room interface or by examining installation directories. Versions 21.0.1, 21.0.2, and 21.0.3 are vulnerable.

Check Version:

Check version in IBM RPA Control Room or examine installation properties files

Verify Fix Applied:

After applying patches, verify that credentials are no longer stored insecurely and check that the version has been updated beyond the vulnerable range.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized physical access to systems
  • Unusual credential access patterns in RPA logs
  • Failed authentication attempts from unexpected locations

Network Indicators:

  • Unusual RPA component communication patterns
  • Credential-related traffic from unexpected sources

SIEM Query:

Search for physical access events to RPA systems combined with credential access or authentication events

🔗 References

📤 Share & Export