CVE-2022-38382

4.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users to access sensitive information from other users' sessions after they have logged out. It affects IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software versions 1.10.12.0 through 1.10.23.0. The issue occurs because sessions are not properly invalidated upon logout.

💻 Affected Systems

Products:
  • IBM Cloud Pak for Security
  • IBM QRadar Suite Software
Versions: CP4S: 1.10.0.0-1.10.11.0, QRadar Suite: 1.10.12.0-1.10.23.0
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of these versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could access sensitive data from other users' sessions, potentially including privileged information, configuration details, or security data.

🟠

Likely Case

Authenticated users could inadvertently or intentionally access residual session data from other users who have logged out, leading to information disclosure.

🟢

If Mitigated

With proper session management controls and network segmentation, the impact is limited to authenticated users within the same security context.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the system. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CP4S: 1.10.12.0+, QRadar Suite: 1.10.24.0+

Vendor Advisory: https://www.ibm.com/support/pages/node/7165286

Restart Required: Yes

Instructions:

1. Download the latest version from IBM Fix Central. 2. Follow IBM's upgrade documentation for your specific product. 3. Apply the update. 4. Restart the application/services.

🔧 Temporary Workarounds

Session Timeout Reduction

all

Reduce session timeout values to minimize window of opportunity for session reuse

Configure application session timeout to minimum practical value

Force Logout Implementation

all

Implement additional logout mechanisms that clear all session data

Implement custom logout handlers that invalidate all session tokens

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit authenticated user access
  • Monitor session activity logs for unusual patterns of session reuse or access

🔍 How to Verify

Check if Vulnerable:

Check your product version against affected ranges. Test logout functionality to see if sessions persist.

Check Version:

Check product administration console or run product-specific version command

Verify Fix Applied:

After patching, verify the version is updated and test that sessions are properly invalidated upon logout.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same user in quick succession
  • Session tokens being reused after logout events

Network Indicators:

  • Unusual patterns of authenticated requests from same source

SIEM Query:

source="ibm_cp4s" OR source="ibm_qradar" AND (event_type="session_reuse" OR (logout_event AND subsequent_auth_with_same_token))

🔗 References

📤 Share & Export