CVE-2024-35116

5.9 MEDIUM

📋 TL;DR

IBM MQ versions 9.0 LTS through 9.3 CD are vulnerable to denial of service attacks when configuration changes are applied. Attackers can exploit this to disrupt MQ services, affecting organizations using these IBM MQ versions for message queuing.

💻 Affected Systems

Products:
  • IBM MQ
Versions: 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.3 CD
Operating Systems: All supported platforms for IBM MQ
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when applying configuration changes; default installations are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of IBM MQ, preventing message processing and causing business operations to halt.

🟠

Likely Case

Temporary service interruption during configuration changes, requiring restart or manual intervention to restore functionality.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring; service may experience brief degradation but recovers quickly.

🌐 Internet-Facing: MEDIUM - While exploitation requires configuration change access, internet-facing MQ instances could be targeted if misconfigured.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with configuration privileges could disrupt critical messaging services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to apply configuration changes; no public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes per IBM advisory: 9.0 LTS (9.0.0.19), 9.1 LTS (9.1.0.15), 9.2 LTS (9.2.0.12), 9.3 LTS (9.3.0.8), 9.3 CD (9.3.0.8)

Vendor Advisory: https://www.ibm.com/support/pages/node/7157387

Restart Required: Yes

Instructions:

1. Review IBM advisory for your specific version. 2. Download appropriate fix from IBM Fix Central. 3. Apply fix following IBM MQ update procedures. 4. Restart MQ services to activate changes.

🔧 Temporary Workarounds

Restrict Configuration Access

all

Limit who can apply configuration changes to trusted administrators only.

# Use MQ security features to restrict configuration privileges
# chmqaut -m QueueManagerName -t qmgr -p UserName +connect +inq +setall

Schedule Configuration Changes

all

Apply configuration changes during maintenance windows with monitoring.

# Monitor MQ logs during configuration changes
# dspmqtrn -m QueueManagerName
# dspmq -o status

🧯 If You Can't Patch

  • Implement strict access controls for MQ configuration management
  • Monitor MQ services closely during configuration changes and have recovery procedures ready

🔍 How to Verify

Check if Vulnerable:

Check IBM MQ version using dspmqver command and compare against affected versions list.

Check Version:

dspmqver

Verify Fix Applied:

Verify version after patching with dspmqver and confirm it matches fixed versions in IBM advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected MQ service restarts after configuration changes
  • Error messages related to configuration application failures in AMQERR01.LOG

Network Indicators:

  • Sudden drop in MQ message traffic
  • Connection failures to MQ services

SIEM Query:

source="mq_logs" AND ("configuration error" OR "service stopped" OR "unexpected termination")

🔗 References

📤 Share & Export