CVE-2024-39745

5.9 MEDIUM

📋 TL;DR

IBM Sterling Connect:Direct Web Services uses weak cryptographic algorithms that could allow attackers to decrypt sensitive data transmitted by the application. This affects versions 6.0 through 6.3 of the software, potentially exposing confidential information.

💻 Affected Systems

Products:
  • IBM Sterling Connect:Direct Web Services
Versions: 6.0, 6.1, 6.2, 6.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using default cryptographic settings are vulnerable. Custom configurations may also be affected if they don't explicitly disable weak algorithms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt highly sensitive business data, financial information, or credentials transmitted via the service, leading to data breaches and compliance violations.

🟠

Likely Case

Attackers intercept and decrypt moderately sensitive configuration data or file transfer metadata, potentially enabling further attacks.

🟢

If Mitigated

With proper network segmentation and encryption controls, impact is limited to internal network traffic analysis.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can intercept and decrypt communications without needing internal access.
🏢 Internal Only: MEDIUM - Requires internal network access but weak crypto makes decryption feasible for attackers who gain network position.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to intercept traffic and cryptographic analysis capabilities. No authentication bypass needed if traffic can be captured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 6.3.0.5 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7166195

Restart Required: Yes

Instructions:

1. Download the interim fix from IBM Fix Central. 2. Stop the Connect:Direct Web Services. 3. Apply the fix according to IBM instructions. 4. Restart the service. 5. Verify cryptographic settings are updated.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connect:Direct Web Services to trusted network segments to limit attack surface

External Encryption

all

Implement VPN or TLS termination proxy with strong cryptography in front of the service

🧯 If You Can't Patch

  • Implement network-level encryption (IPsec/VPN) for all traffic to/from the service
  • Restrict network access to only required clients and monitor for unusual traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check version via administrative console or configuration files. Versions 6.0-6.3 are vulnerable unless patched to 6.3.0.5 or later.

Check Version:

Check version in administrative console or review installation logs/config files

Verify Fix Applied:

Verify version is 6.3.0.5 or later and check cryptographic configuration to ensure weak algorithms are disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual decryption errors
  • Failed cryptographic handshakes
  • Unexpected connection resets

Network Indicators:

  • Unusual traffic patterns to/from Connect:Direct ports
  • SSL/TLS version downgrade attempts

SIEM Query:

source="connect_direct" AND (event="crypto_error" OR event="handshake_failure")

🔗 References

📤 Share & Export