CVE-2024-25034

8.0 HIGH

📋 TL;DR

IBM Planning Analytics 2.0 and 2.1 have a file upload vulnerability in the File Manager T1 process that allows attackers to upload malicious executable files. This could enable attackers to distribute malware to victims through the compromised system. Organizations using these versions of IBM Planning Analytics are affected.

💻 Affected Systems

Products:
  • IBM Planning Analytics
Versions: 2.0 and 2.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the File Manager T1 process specifically. All deployments with these versions are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers upload and execute malware that compromises the entire Planning Analytics environment, leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Attackers upload malicious files that are then distributed to users, potentially leading to malware infections on client systems or credential theft.

🟢

If Mitigated

With proper network segmentation and file validation controls, impact is limited to the Planning Analytics application layer with no lateral movement.

🌐 Internet-Facing: HIGH - If the Planning Analytics instance is internet-facing, attackers can directly exploit this vulnerability without internal access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this, but requires some level of access to the Planning Analytics interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the Planning Analytics interface with file upload permissions. No public exploit code is available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix pack 2.0.0.24 for version 2.0 or 2.1.0.15 for version 2.1

Vendor Advisory: https://www.ibm.com/support/pages/node/7168387

Restart Required: No

Instructions:

1. Download the appropriate fix pack from IBM Fix Central. 2. Apply the fix pack following IBM's installation instructions. 3. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Restrict File Upload Permissions

all

Limit which users can upload files through the File Manager T1 process

Implement File Type Validation

all

Add server-side validation to reject executable file types

🧯 If You Can't Patch

  • Implement network segmentation to isolate Planning Analytics from critical systems
  • Deploy web application firewall with file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Check IBM Planning Analytics version via administration console or configuration files

Check Version:

Check version in PAW (Planning Analytics Workspace) or TM1 server configuration

Verify Fix Applied:

Verify fix pack installation in IBM Planning Analytics administration panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in Planning Analytics logs
  • Uploads of executable file types (.exe, .bat, .ps1, etc.)

Network Indicators:

  • Unexpected outbound connections from Planning Analytics server
  • File downloads from Planning Analytics to unexpected destinations

SIEM Query:

source="ibm_planning_analytics" AND (event="file_upload" AND file_extension IN ("exe", "bat", "ps1", "sh", "jar"))

🔗 References

📤 Share & Export