CVE-2024-35111

4.3 MEDIUM

📋 TL;DR

IBM Control Center versions 6.2.1 and 6.3.1 expose detailed technical error messages to remote attackers, potentially revealing sensitive system information. This information disclosure vulnerability could assist attackers in planning further attacks against the system. Organizations running these specific IBM Control Center versions are affected.

💻 Affected Systems

Products:
  • IBM Control Center
Versions: 6.2.1, 6.3.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only these specific versions are affected; earlier or later versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain detailed system information that enables successful follow-on attacks like authentication bypass, privilege escalation, or remote code execution.

🟠

Likely Case

Attackers gather technical details about the system configuration, software versions, and internal paths that could be used to craft targeted attacks.

🟢

If Mitigated

Limited information exposure with no direct system compromise, though some reconnaissance value remains for attackers.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires triggering error conditions that reveal detailed messages, which may be straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as per IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7174806

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL
2. Apply recommended interim fix or upgrade
3. Restart IBM Control Center services
4. Verify error messages no longer expose sensitive details

🔧 Temporary Workarounds

Configure generic error messages

all

Modify application configuration to return generic error messages instead of detailed technical information

Consult IBM Control Center documentation for error message configuration

Web application firewall rules

all

Implement WAF rules to block or sanitize error messages containing technical details

Configure WAF to detect and block responses containing stack traces, file paths, or version information

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to IBM Control Center from untrusted networks
  • Monitor application logs for unusual error conditions or repeated error triggering attempts

🔍 How to Verify

Check if Vulnerable:

Test by triggering error conditions and checking if detailed technical information is returned in browser responses

Check Version:

Check IBM Control Center version through administrative interface or configuration files

Verify Fix Applied:

After patching, trigger the same error conditions and verify only generic error messages are returned

📡 Detection & Monitoring

Log Indicators:

  • Unusual increase in error messages
  • Repeated requests triggering specific error conditions
  • Access logs showing patterns of error exploration

Network Indicators:

  • HTTP responses containing detailed error messages, stack traces, or internal paths

SIEM Query:

source="ibm_control_center" AND (message="*error*" OR message="*exception*") | stats count by src_ip

🔗 References

📤 Share & Export