CVE-2023-30444

7.1 HIGH

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in IBM Watson Machine Learning on Cloud Pak for Data. An authenticated attacker could exploit this to send unauthorized requests from the vulnerable system, potentially accessing internal network resources or facilitating other attacks. Organizations running affected versions of IBM Watson Machine Learning on Cloud Pak for Data 4.0 or 4.5 are at risk.

💻 Affected Systems

Products:
  • IBM Watson Machine Learning on Cloud Pak for Data
Versions: 4.0 and 4.5
Operating Systems: Not OS-specific - runs on Cloud Pak for Data platform
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Affects both versions 4.0 and 4.5 of IBM Watson Machine Learning on Cloud Pak for Data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could use the vulnerable system as a proxy to access internal network resources, exfiltrate sensitive data, or pivot to attack other internal systems.

🟠

Likely Case

An authenticated attacker could perform network reconnaissance, access internal services, or use the system to launch attacks against other internal resources.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the immediate network segment where the vulnerable system resides.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. SSRF vulnerabilities are typically straightforward to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/6985859

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL. 2. Apply the recommended fix for your specific version. 3. Restart affected services. 4. Verify the fix is applied correctly.

🔧 Temporary Workarounds

Network segmentation

all

Restrict outbound network access from the vulnerable system to only necessary destinations

Access control hardening

all

Implement strict authentication and authorization controls to limit who can access the vulnerable functionality

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit what destinations the system can reach
  • Enhance authentication and authorization controls to minimize attack surface

🔍 How to Verify

Check if Vulnerable:

Check your IBM Watson Machine Learning on Cloud Pak for Data version. If running version 4.0 or 4.5 without the fix, you are vulnerable.

Check Version:

Check version through IBM Cloud Pak for Data administration interface or consult IBM documentation for version checking commands.

Verify Fix Applied:

Verify that the patch has been applied by checking the version and confirming with IBM's patch verification procedures.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from the Watson Machine Learning service
  • Requests to internal IP addresses or unusual domains
  • Authentication logs showing suspicious user activity

Network Indicators:

  • Unexpected outbound connections from the Watson Machine Learning system
  • Traffic to internal network segments that shouldn't be accessed

SIEM Query:

Example: source_ip="watson-ml-server" AND (dest_ip="10.0.0.0/8" OR dest_ip="172.16.0.0/12" OR dest_ip="192.168.0.0/16") AND protocol="HTTP"

🔗 References

📤 Share & Export