CVE-2022-35284

7.5 HIGH

📋 TL;DR

IBM Security Verify Information Queue 10.0.2 has a missing or insecure SameSite attribute on sensitive cookies, allowing attackers to potentially steal session tokens or sensitive data via cross-site request forgery attacks. This affects all deployments of IBM Security Verify Information Queue 10.0.2. The vulnerability could lead to unauthorized access to sensitive information.

💻 Affected Systems

Products:
  • IBM Security Verify Information Queue
Versions: 10.0.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only version 10.0.2 is affected. Earlier and later versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies and gain unauthorized administrative access to the IBM Security Verify Information Queue system, potentially compromising all managed security information and credentials.

🟠

Likely Case

Attackers could perform session hijacking to access sensitive information within the Information Queue, potentially exposing security logs, configuration data, and other protected information.

🟢

If Mitigated

With proper SameSite cookie attributes and CSRF protections, the risk is limited to information disclosure within the current session context only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to trick an authenticated user into visiting a malicious website while logged into the vulnerable system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to a non-vulnerable version

Vendor Advisory: https://www.ibm.com/support/pages/node/6606663

Restart Required: Yes

Instructions:

1. Review IBM advisory at https://www.ibm.com/support/pages/node/6606663
2. Apply the interim fix provided by IBM
3. Restart the IBM Security Verify Information Queue service
4. Verify the fix by checking cookie attributes

🔧 Temporary Workarounds

Configure SameSite Cookie Attribute

all

Manually configure SameSite=Strict or SameSite=Lax attributes for sensitive cookies in the application configuration

Configuration varies by deployment - refer to IBM documentation for cookie configuration

Implement CSRF Protection

all

Add CSRF tokens to all state-changing requests and validate them server-side

Implement anti-CSRF middleware or framework-specific CSRF protection

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to IBM Security Verify Information Queue to trusted networks only
  • Deploy a web application firewall (WAF) with CSRF protection rules enabled

🔍 How to Verify

Check if Vulnerable:

Inspect cookies in browser developer tools for IBM Security Verify Information Queue session cookies. Check if SameSite attribute is missing or set to 'None' without 'Secure' flag.

Check Version:

Check IBM Security Verify Information Queue version through administrative interface or configuration files

Verify Fix Applied:

Verify that all sensitive cookies now have SameSite=Strict or SameSite=Lax attributes and Secure flag when appropriate.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from same session
  • Unusual access patterns to sensitive endpoints

Network Indicators:

  • Cross-origin requests to sensitive endpoints without proper referrer headers
  • Requests with missing or malformed CSRF tokens

SIEM Query:

source="ibm_security_verify" AND (event_type="authentication_failure" OR event_type="sensitive_access") | stats count by src_ip, user

🔗 References

📤 Share & Export