CVE-2023-38714

5.3 MEDIUM

📋 TL;DR

IBM Cloud Pak System versions 2.3.3.0 through 2.3.3.7 iFix1 contain an information disclosure vulnerability that could expose sensitive system details. Attackers could leverage this information to plan further attacks against the system. Organizations running affected IBM Cloud Pak System versions are vulnerable.

💻 Affected Systems

Products:
  • IBM Cloud Pak System
Versions: 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.3.6 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain detailed system configuration, credentials, or internal network information that enables them to launch targeted attacks leading to full system compromise.

🟠

Likely Case

Attackers gather system information that helps them identify other vulnerabilities or weak points for subsequent exploitation attempts.

🟢

If Mitigated

With proper network segmentation and access controls, the exposed information has limited utility for attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-209 typically involves information leakage through error messages or debug information that doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest fix pack or upgrade to a non-vulnerable version

Vendor Advisory: https://www.ibm.com/support/pages/node/7159533

Restart Required: Yes

Instructions:

1. Review IBM advisory at the provided URL. 2. Apply the latest fix pack for your version. 3. Restart affected services. 4. Verify the fix.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to IBM Cloud Pak System management interfaces to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IBM Cloud Pak System from untrusted networks
  • Monitor system logs for unusual access patterns or information disclosure attempts

🔍 How to Verify

Check if Vulnerable:

Check your IBM Cloud Pak System version against the affected versions list.

Check Version:

Check through IBM Cloud Pak System administration interface or consult IBM documentation for version checking commands.

Verify Fix Applied:

Verify that you have applied the latest fix pack and the version is no longer in the vulnerable range.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to system information endpoints
  • Error messages containing sensitive information in logs

Network Indicators:

  • Unexpected requests to system information endpoints from unauthorized sources

SIEM Query:

source="ibm_cloud_pak" AND (event_type="error" OR event_type="debug") AND message CONTAINS "sensitive"

🔗 References

📤 Share & Export