CVE-2024-28767

6.8 MEDIUM

📋 TL;DR

This vulnerability allows remote authenticated attackers to execute arbitrary commands on IBM Security Directory Integrator systems by sending specially crafted requests. It affects IBM Security Directory Integrator versions 7.2.0 through 7.2.0.13 and 10.0.0 through 10.0.3. Attackers need valid credentials to exploit this command injection flaw.

💻 Affected Systems

Products:
  • IBM Security Directory Integrator
Versions: 7.2.0 through 7.2.0.13 and 10.0.0 through 10.0.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All deployments with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to data exfiltration, privilege escalation, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege access, and command execution restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to weaponize once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.0.14 and 10.0.4

Vendor Advisory: https://www.ibm.com/support/pages/node/7179558

Restart Required: Yes

Instructions:

1. Download patches from IBM Fix Central. 2. Apply patch for your version (7.2.0.14 for 7.2.x, 10.0.4 for 10.0.x). 3. Restart IBM Security Directory Integrator services. 4. Verify successful update.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to IBM Security Directory Integrator to only trusted IP addresses and required users.

Least Privilege Authentication

all

Implement strict authentication controls and limit user permissions to minimum required functionality.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to the vulnerable system
  • Apply principle of least privilege to all user accounts and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM Security Directory Integrator version via administrative console or configuration files. Compare against affected versions.

Check Version:

Check version in IBM Security Directory Integrator administrative interface or configuration files (version varies by installation method)

Verify Fix Applied:

Verify version is 7.2.0.14 or higher for 7.2.x branch, or 10.0.4 or higher for 10.0.x branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Authentication from unexpected sources
  • Suspicious request patterns to IBM Security Directory Integrator endpoints

Network Indicators:

  • Unusual outbound connections from IBM Security Directory Integrator server
  • Command and control traffic patterns

SIEM Query:

source="ibm_sdi" AND (event_type="command_execution" OR auth_failure OR suspicious_request)

🔗 References

📤 Share & Export