CVE-2024-22341

5.3 MEDIUM

📋 TL;DR

This vulnerability in IBM Watson Query on Cloud Pak for Data allows unauthorized access to remote data sources due to improper privilege management. Attackers could potentially access sensitive data they shouldn't have permission to view. Affected versions include 4.0.0-4.0.9, 4.5.0-4.5.3, 4.6.0-4.6.6, 4.7.0-4.7.4, and 4.8.0-4.8.7.

💻 Affected Systems

Products:
  • IBM Watson Query on Cloud Pak for Data
Versions: 4.0.0 through 4.0.9, 4.5.0 through 4.5.3, 4.6.0 through 4.6.6, 4.7.0 through 4.7.4, and 4.8.0 through 4.8.7
Operating Systems: Platform independent - affects Cloud Pak for Data deployments
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of the specified versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive data from remote data sources, potentially including personally identifiable information, financial data, or intellectual property.

🟠

Likely Case

Unauthorized users accessing data they shouldn't have permission to view, leading to data exposure and potential compliance violations.

🟢

If Mitigated

Limited or no data exposure if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to the system, but detailed exploitation methods are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest fix packs: 4.0.10, 4.5.4, 4.6.7, 4.7.5, or 4.8.8

Vendor Advisory: https://www.ibm.com/support/pages/node/7183851

Restart Required: Yes

Instructions:

1. Review IBM advisory at the provided URL. 2. Download appropriate fix pack for your version. 3. Apply fix pack following IBM's installation procedures. 4. Restart affected services. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict Access to Watson Query

all

Limit network access to Watson Query services to only authorized users and systems.

Implement Least Privilege Access

all

Review and tighten user permissions to ensure users only have access to data sources they legitimately need.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Watson Query from sensitive data sources
  • Enhance monitoring and logging of data access patterns to detect unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check your Cloud Pak for Data version using the platform's administration interface or by running: oc get pods -n <namespace> | grep watson-query

Check Version:

oc describe pod <watson-query-pod-name> -n <namespace> | grep Image

Verify Fix Applied:

Verify you have applied the patched version (4.0.10, 4.5.4, 4.6.7, 4.7.5, or 4.8.8) and check that unauthorized data access attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns from unexpected users
  • Failed authorization attempts for data sources
  • Access to data sources outside normal business hours

Network Indicators:

  • Unexpected connections to remote data sources
  • Unusual query patterns to backend databases

SIEM Query:

source="watson-query" AND (event_type="data_access" OR event_type="authorization_failure") AND (user NOT IN authorized_users_list)

🔗 References

📤 Share & Export