CVE-2024-22351

6.3 MEDIUM

📋 TL;DR

IBM InfoSphere Information Server 11.7 fails to properly invalidate user sessions after logout, allowing authenticated users to reuse old session tokens to impersonate other users. This affects organizations using IBM InfoSphere Information Server 11.7 for data integration and governance. The vulnerability requires an authenticated user to exploit.

💻 Affected Systems

Products:
  • IBM InfoSphere Information Server
Versions: 11.7
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of IBM InfoSphere Information Server 11.7 regardless of configuration. The vulnerability is in the session management logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious user could steal another user's active session and gain unauthorized access to sensitive data, modify data integration workflows, or escalate privileges within the InfoSphere environment.

🟠

Likely Case

An authenticated user could reuse their own or another user's session after logout to maintain access or access resources they shouldn't have access to, potentially leading to data exposure or unauthorized actions.

🟢

If Mitigated

With proper session management controls and monitoring, the impact is limited to temporary unauthorized access that can be detected and revoked.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an authenticated user session. The attacker needs to capture or predict valid session tokens that should have been invalidated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix pack 11.7.1.4 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7229921

Restart Required: Yes

Instructions:

1. Download the latest fix pack from IBM Fix Central. 2. Apply the fix pack following IBM's installation instructions. 3. Restart the InfoSphere Information Server services. 4. Verify the fix by testing session invalidation after logout.

🔧 Temporary Workarounds

Implement Session Timeout

all

Configure shorter session timeout values to limit the window where stale sessions could be reused.

Configure in InfoSphere Administration Console: Security > Session Management > Set appropriate timeout values

Force Logout All Users

all

Periodically force all users to re-authenticate to clear potentially stale sessions.

Schedule periodic service restarts or use administrative tools to invalidate all sessions

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to InfoSphere servers to only authorized users and systems.
  • Enable detailed session logging and monitor for suspicious session reuse patterns.

🔍 How to Verify

Check if Vulnerable:

Check if running IBM InfoSphere Information Server version 11.7 without fix pack 11.7.1.4 or later applied.

Check Version:

Check the version in the InfoSphere Administration Console or run: /opt/IBM/InformationServer/ASBServer/bin/versionInfo.sh (Linux) or equivalent on Windows

Verify Fix Applied:

After applying the fix, test by logging in, performing actions, logging out, then attempting to reuse the same session token - it should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same session ID after logout events
  • Session reuse from different IP addresses or user agents
  • Unusual session duration patterns

Network Indicators:

  • Repeated authentication requests with same session tokens
  • Session tokens being used after logout events

SIEM Query:

source="infosphere_logs" AND (event_type="session_reuse" OR (event_type="logout" AND subsequent_event="successful_auth" WITH same session_id))

🔗 References

📤 Share & Export