CVE-2024-22314

5.9 MEDIUM

📋 TL;DR

IBM Storage Defender - Resiliency Service versions 2.0.0 through 2.0.12 use weak cryptographic algorithms, potentially allowing attackers to decrypt sensitive information. This affects organizations using these specific versions of IBM's data protection software.

💻 Affected Systems

Products:
  • IBM Storage Defender - Resiliency Service
Versions: 2.0.0 through 2.0.12
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt highly sensitive backup/restore data including credentials, encryption keys, and protected data, leading to data breaches and compliance violations.

🟠

Likely Case

Attackers with access to encrypted data could decrypt sensitive configuration information or backup metadata, compromising data confidentiality.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to specific protected data sets rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to encrypted data and cryptographic analysis capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.13 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7229903

Restart Required: Yes

Instructions:

1. Download IBM Storage Defender - Resiliency Service 2.0.13 or later from IBM Fix Central. 2. Follow IBM's upgrade documentation for your deployment type. 3. Restart the Resiliency Service after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to IBM Storage Defender management interfaces to trusted networks only.

Access Control Hardening

all

Implement strict access controls and monitoring for systems storing encrypted data protected by IBM Storage Defender.

🧯 If You Can't Patch

  • Isolate IBM Storage Defender systems from untrusted networks and implement strict access controls.
  • Monitor for unusual access patterns to encrypted data stores and implement additional encryption layers for sensitive data.

🔍 How to Verify

Check if Vulnerable:

Check the IBM Storage Defender Resiliency Service version via the web interface or CLI. Versions 2.0.0 through 2.0.12 are vulnerable.

Check Version:

Check via IBM Storage Defender web interface or consult IBM documentation for CLI commands specific to your deployment.

Verify Fix Applied:

Verify version is 2.0.13 or later and confirm service is running with updated cryptographic libraries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to encrypted data stores
  • Failed cryptographic operations in application logs

Network Indicators:

  • Unexpected network traffic to/from IBM Storage Defender systems
  • Traffic patterns suggesting data exfiltration attempts

SIEM Query:

Search for IBM Storage Defender version strings 2.0.0 through 2.0.12 in asset inventory or configuration logs.

🔗 References

📤 Share & Export