CVE-2024-41773

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Global Configuration Management allows authenticated users to archive global baselines due to improper access controls. It affects versions 7.0.2 and 7.0.3 of the software. Attackers with valid credentials can perform unauthorized baseline archiving operations.

💻 Affected Systems

Products:
  • IBM Global Configuration Management
Versions: 7.0.2 through 7.0.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the system; all deployments of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could archive critical global baselines, disrupting configuration management processes and potentially causing service outages or configuration drift.

🟠

Likely Case

Malicious or compromised users could archive baselines they shouldn't have access to, causing operational disruption and requiring restoration from backups.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized baseline archiving that can be detected and restored.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but the vulnerability itself is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7165963

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL
2. Apply the interim fix or upgrade to a fixed version
3. Restart the IBM Global Configuration Management service
4. Verify the fix by testing baseline archiving permissions

🔧 Temporary Workarounds

Restrict User Permissions

all

Tighten access controls to limit which users can archive global baselines

Enhanced Monitoring

all

Implement monitoring for baseline archiving operations

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all authenticated users
  • Enable detailed audit logging for all baseline operations and monitor for unauthorized archiving

🔍 How to Verify

Check if Vulnerable:

Check IBM Global Configuration Management version via administrative interface or configuration files

Check Version:

Check version in product administrative console or configuration files

Verify Fix Applied:

Test baseline archiving with non-privileged users after applying fix to ensure proper access controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized baseline archiving events
  • Baseline archiving by non-admin users
  • Multiple baseline archiving operations in short time

Network Indicators:

  • HTTP requests to baseline archiving endpoints from unauthorized users

SIEM Query:

Search for baseline archive operations from users without appropriate permissions

🔗 References

📤 Share & Export