CVE-2024-39747

8.1 HIGH

📋 TL;DR

IBM Sterling Connect:Direct Web Services uses default credentials for critical functionality, allowing attackers to gain unauthorized access. This affects versions 6.0 through 6.3 of the software. Organizations using these versions without changing default credentials are vulnerable.

💻 Affected Systems

Products:
  • IBM Sterling Connect:Direct Web Services
Versions: 6.0, 6.1, 6.2, 6.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable if default credentials have not been changed from installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Connect:Direct Web Services instance, allowing attackers to execute arbitrary commands, access sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to file transfer functionality, data exfiltration, and potential modification of critical business data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls are in place, though default credentials still pose a risk.

🌐 Internet-Facing: HIGH - Internet-facing instances with default credentials can be easily discovered and exploited.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires some level of network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of default credentials but no authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 6.3.0.5 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7166947

Restart Required: Yes

Instructions:

1. Download the interim fix from IBM Fix Central. 2. Stop the Connect:Direct Web Services. 3. Apply the fix. 4. Restart the service. 5. Change default credentials immediately.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default passwords and usernames for Connect:Direct Web Services

Use the administrative interface to change credentials

Network Segmentation

all

Restrict network access to Connect:Direct Web Services to only trusted sources

Configure firewall rules to limit access

🧯 If You Can't Patch

  • Immediately change all default credentials to strong, unique passwords
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if Connect:Direct Web Services is using default credentials by attempting authentication with known defaults

Check Version:

Check the version in the administrative console or configuration files

Verify Fix Applied:

Verify that default credentials no longer work and only authorized credentials provide access

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login with default credentials
  • Unusual file transfer activities

Network Indicators:

  • Unauthorized access to Connect:Direct Web Services ports
  • Suspicious file transfer patterns

SIEM Query:

source="connect_direct_ws" AND (event_type="authentication" AND result="success" AND user="default_user")

🔗 References

📤 Share & Export