CVE-2024-35118

4.6 MEDIUM

📋 TL;DR

IBM MaaS360 for Android versions 6.31 through 8.60 contain hard-coded credentials that can be extracted by anyone with physical access to the device. This allows unauthorized access to MaaS360 functionality and potentially sensitive enterprise data managed through the application. Only Android devices running the affected MaaS360 versions are impacted.

💻 Affected Systems

Products:
  • IBM MaaS360 for Android
Versions: 6.31 through 8.60
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version of IBM MaaS360. Requires physical access to the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical device access extracts credentials, gains administrative access to MaaS360, and exfiltrates sensitive enterprise data, modifies device policies, or performs unauthorized actions on managed devices.

🟠

Likely Case

An employee or unauthorized person with temporary physical access extracts credentials and accesses enterprise data or settings they shouldn't have permission to view.

🟢

If Mitigated

With proper mobile device management policies, device encryption, and physical security controls, the risk is limited to authorized users who might access functionality beyond their intended permissions.

🌐 Internet-Facing: LOW - Exploitation requires physical device access, not network connectivity.
🏢 Internal Only: MEDIUM - Physical access to corporate mobile devices could allow unauthorized access to enterprise data and settings.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires physical access and basic Android debugging/reverse engineering skills.

Exploitation requires physical device access and ability to extract credentials from the application, which could be done through various Android debugging or reverse engineering techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to IBM MaaS360 for Android version 8.61 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7166750

Restart Required: Yes

Instructions:

1. Open Google Play Store on affected Android devices. 2. Search for IBM MaaS360. 3. If update is available, tap Update. 4. Restart device after update completes. 5. Verify version is 8.61 or higher in MaaS360 settings.

🔧 Temporary Workarounds

Enhance Physical Security Controls

all

Implement strict physical security policies for mobile devices including device encryption, strong screen locks, and remote wipe capabilities.

Restrict Debugging Capabilities

android

Disable USB debugging and developer options on corporate Android devices to make credential extraction more difficult.

🧯 If You Can't Patch

  • Implement strict physical security controls for all mobile devices and enforce device encryption
  • Monitor for unusual MaaS360 activity and implement least privilege access controls within the application

🔍 How to Verify

Check if Vulnerable:

Check MaaS360 version in app settings. If version is between 6.31 and 8.60 inclusive, the device is vulnerable.

Check Version:

Open IBM MaaS360 app → Settings → About → Check version number

Verify Fix Applied:

Verify MaaS360 version is 8.61 or higher in app settings after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns in MaaS360 logs
  • Access from unexpected user accounts or devices

Network Indicators:

  • Unusual API calls to MaaS360 services from unexpected locations

SIEM Query:

source="maas360" AND (event_type="authentication" AND result="success" AND user NOT IN authorized_users)

🔗 References

📤 Share & Export