CVE-2024-28169

5.4 MEDIUM

📋 TL;DR

BigDL software versions before 2.5.0 transmit sensitive information in cleartext, allowing authenticated attackers on adjacent networks to potentially cause denial of service. This affects organizations using Intel's BigDL distributed deep learning library in vulnerable configurations.

💻 Affected Systems

Products:
  • Intel BigDL
Versions: All versions before 2.5.0
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires BigDL to be configured with cleartext transmission enabled for sensitive data.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker on adjacent network intercepts cleartext sensitive data and uses it to cause complete service disruption of BigDL applications.

🟠

Likely Case

Information disclosure of sensitive data transmitted in cleartext, potentially enabling targeted DoS attacks against specific BigDL services.

🟢

If Mitigated

Minimal impact with proper network segmentation and encryption controls in place.

🌐 Internet-Facing: LOW - Requires adjacent network access and authentication, not directly internet exploitable.
🏢 Internal Only: MEDIUM - Internal authenticated users on same network segment could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and adjacent network positioning to intercept cleartext transmissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.0 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01146.html

Restart Required: Yes

Instructions:

1. Download BigDL version 2.5.0 or later from official Intel sources. 2. Stop all BigDL services. 3. Backup configuration and data. 4. Install the updated version. 5. Restart BigDL services.

🔧 Temporary Workarounds

Enable TLS/SSL Encryption

all

Configure BigDL to use encrypted communication channels instead of cleartext transmission.

Configure BigDL properties to use SSL/TLS: bigdl.ssl.enabled=true
Set appropriate SSL/TLS configuration parameters in bigdl.properties

Network Segmentation

all

Isolate BigDL systems to trusted network segments only.

Implement firewall rules to restrict BigDL traffic to authorized subnets only

🧯 If You Can't Patch

  • Implement strict network access controls to limit adjacent network access to BigDL systems
  • Deploy network monitoring to detect cleartext transmission of sensitive data

🔍 How to Verify

Check if Vulnerable:

Check BigDL version: if version < 2.5.0 and cleartext transmission is enabled for sensitive data, system is vulnerable.

Check Version:

bigdl --version or check BigDL configuration files for version information

Verify Fix Applied:

Verify BigDL version is 2.5.0 or later and confirm encrypted transmission is configured for sensitive data.

📡 Detection & Monitoring

Log Indicators:

  • Cleartext authentication attempts
  • Unusual network traffic patterns to/from BigDL services

Network Indicators:

  • Cleartext transmission of sensitive data on BigDL ports
  • Unencrypted authentication traffic

SIEM Query:

source="bigdl" AND (event="authentication" OR event="data_transmission") AND protocol="tcp" AND NOT encryption="enabled"

🔗 References

📤 Share & Export