CVE-2023-42006

8.4 HIGH

📋 TL;DR

This vulnerability in IBM Administration Runtime Expert for i allows local users to bypass proper authority checks and access sensitive information they shouldn't have permission to view. It affects IBM i (AS/400) systems running Administration Runtime Expert versions 7.2 through 7.5. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • IBM Administration Runtime Expert for i
Versions: 7.2, 7.3, 7.4, 7.5
Operating Systems: IBM i (formerly OS/400, i5/OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable. The vulnerability is in the Administration Runtime Expert component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious local user could access sensitive system information, configuration data, or potentially escalate privileges to gain unauthorized administrative access to the IBM i system.

🟠

Likely Case

Local users with limited permissions could access sensitive information about system configuration, user accounts, or other administrative data they shouldn't be able to view.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to authorized users who already have some level of system access.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the IBM i system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - This poses significant risk in environments where multiple users have local access to IBM i systems, particularly in shared hosting or multi-tenant environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the IBM i system. The vulnerability involves improper authority checks, suggesting relatively straightforward exploitation once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM i PTF Group SF99738 Level 26 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7085891

Restart Required: Yes

Instructions:

1. Check current PTF level on IBM i system
2. Apply IBM i PTF Group SF99738 Level 26 or later
3. Restart the system as required
4. Verify the PTF was successfully applied

🔧 Temporary Workarounds

Restrict local access

ibmi

Limit local access to IBM i systems to only authorized administrative personnel

GRTOBJAUT OBJ(QSYS/*ALL) OBJTYPE(*LIB) USER(*PUBLIC) AUT(*EXCLUDE)
CHGUSRAUD USRPRF(user_profile) SPCAUT(*NONE)

Implement least privilege

ibmi

Ensure users only have minimum necessary permissions on the system

WRKUSRPRF user_profile
Edit user profile to remove unnecessary special authorities

🧯 If You Can't Patch

  • Implement strict access controls to limit local system access to trusted administrators only
  • Monitor system logs for unauthorized access attempts to Administration Runtime Expert functions

🔍 How to Verify

Check if Vulnerable:

Check if Administration Runtime Expert version 7.2-7.5 is installed and if PTF Group SF99738 Level 26 is not applied

Check Version:

DSPPTF LICPGM(5770SS1) or GO LICPGM to check installed PTFs

Verify Fix Applied:

Verify PTF Group SF99738 Level 26 or later is installed using DSPPTF command

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Administration Runtime Expert functions
  • Unusual user activity in QSYSOPR or other system logs
  • Failed authority checks in security audit journal

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

Search for events where user with limited privileges accesses Administration Runtime Expert functions or sensitive system objects

🔗 References

📤 Share & Export