CVE-2023-46175

4.4 MEDIUM

📋 TL;DR

IBM Cloud Pak for Multicloud Management versions 2.3 through 2.3 FP8 store user credentials in plain text within log files. This allows privileged users with access to these logs to read sensitive authentication information. Organizations using these versions of IBM Cloud Pak for Multicloud Management are affected.

💻 Affected Systems

Products:
  • IBM Cloud Pak for Multicloud Management
Versions: 2.3 through 2.3 FP8
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of the specified versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attackers gain access to user credentials, potentially leading to unauthorized access to the management platform and managed systems, credential reuse attacks, and lateral movement within the environment.

🟠

Likely Case

Authorized administrators or users with log access inadvertently or intentionally view credentials, potentially leading to unauthorized access or credential misuse within the organization.

🟢

If Mitigated

With proper access controls limiting log file access to only necessary personnel and monitoring for suspicious access, the impact is limited to potential insider threats.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged access to log files, typically through administrative privileges or compromised accounts with log access permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3 FP9 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7170411

Restart Required: Yes

Instructions:

1. Upgrade to IBM Cloud Pak for Multicloud Management 2.3 FP9 or later. 2. Follow IBM's upgrade documentation for your specific deployment. 3. Restart affected services after upgrade.

🔧 Temporary Workarounds

Restrict log file access

linux

Implement strict file permissions to limit access to log files containing credentials to only essential administrative accounts.

chmod 600 /path/to/log/files/*.log
chown root:root /path/to/log/files/*.log

Enable log file encryption

all

Use filesystem encryption or encrypted storage for log directories to protect credentials at rest.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can read log files to only absolutely necessary personnel.
  • Monitor and audit access to log files for suspicious activity using SIEM tools.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Cloud Pak for Multicloud Management. If version is between 2.3 and 2.3 FP8 inclusive, the system is vulnerable.

Check Version:

oc get pods -n ibm-common-services -l release=icp-mcm-prod --no-headers | awk '{print $1}' | xargs -I {} oc exec {} -- cat /opt/ibm/version.txt

Verify Fix Applied:

After upgrading to 2.3 FP9 or later, verify that credentials are no longer logged in plain text by checking recent log files for credential patterns.

📡 Detection & Monitoring

Log Indicators:

  • Plain text passwords or credentials appearing in application logs
  • Unexpected access patterns to log files containing credentials

Network Indicators:

  • Unusual authentication attempts from unexpected locations following log file access

SIEM Query:

source="*/logs/*.log" AND ("password=" OR "credential=" OR "auth=" OR "secret=")

🔗 References

📤 Share & Export