CVE-2022-43740

7.5 HIGH

📋 TL;DR

This vulnerability in IBM Security Verify Access OIDC Provider allows remote attackers to cause denial of service through uncontrolled resource consumption. It affects IBM Security Verify Access deployments using OIDC Provider functionality. The vulnerability could render authentication services unavailable to legitimate users.

💻 Affected Systems

Products:
  • IBM Security Verify Access
Versions: IBM Security Verify Access 10.0.0 through 10.0.6.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using OIDC Provider functionality. Other components of IBM Security Verify Access are not affected.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unavailability of authentication services, preventing all users from accessing protected applications and systems.

🟠

Likely Case

Degraded performance or intermittent outages of authentication services, impacting user productivity and application availability.

🟢

If Mitigated

Minimal impact with proper rate limiting, resource monitoring, and network controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and can be exploited by sending specially crafted requests to the OIDC Provider endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM Security Verify Access 10.0.6.2 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7028513

Restart Required: Yes

Instructions:

1. Download IBM Security Verify Access 10.0.6.2 or later from IBM Fix Central. 2. Backup current configuration. 3. Apply the update following IBM's installation guide. 4. Restart the IBM Security Verify Access services.

🔧 Temporary Workarounds

Rate Limiting

all

Implement rate limiting on OIDC Provider endpoints to prevent resource exhaustion attacks

Configure rate limiting in your web application firewall or load balancer for /oidc/ endpoints

Network Segmentation

all

Restrict access to OIDC Provider endpoints to trusted networks only

Configure firewall rules to limit access to IBM Security Verify Access OIDC endpoints

🧯 If You Can't Patch

  • Implement strict rate limiting and request throttling on OIDC endpoints
  • Monitor resource consumption and set up alerts for abnormal traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check IBM Security Verify Access version via administrative console or command line. Versions 10.0.0 through 10.0.6.1 are vulnerable.

Check Version:

On Linux: /opt/IBM/isva/bin/version.sh or check via IBM Security Verify Access administrative console

Verify Fix Applied:

Verify version is 10.0.6.2 or later and test OIDC functionality remains operational under normal load.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high number of OIDC requests
  • Resource exhaustion warnings
  • Authentication service failures

Network Indicators:

  • High volume of requests to /oidc/ endpoints
  • Abnormal traffic patterns from single IPs

SIEM Query:

source="ibm_verify_access" AND (message="resource exhaustion" OR message="high load" OR endpoint="/oidc/")

🔗 References

📤 Share & Export