CVE-2024-43169

8.8 HIGH

📋 TL;DR

IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1 contain a vulnerability that allows users to download malicious files without proper integrity verification. This could lead to arbitrary code execution on affected systems. Organizations using these specific DOORS Next versions are at risk.

💻 Affected Systems

Products:
  • IBM Engineering Requirements Management DOORS Next
Versions: 7.0.2, 7.0.3, 7.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific versions; earlier or later versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary code with the privileges of the DOORS Next application, potentially leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Malicious actors could upload and distribute malware to users through the DOORS Next interface, leading to client-side infections or credential harvesting.

🟢

If Mitigated

With proper network segmentation and endpoint protection, impact could be limited to isolated application servers without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to download malicious file; exploitation details not publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 7.0.2 iFix003, 7.0.3 iFix003, or 7.1 iFix001

Vendor Advisory: https://www.ibm.com/support/pages/node/7184506

Restart Required: Yes

Instructions:

1. Download appropriate interim fix from IBM Fix Central. 2. Stop DOORS Next services. 3. Apply the fix according to IBM documentation. 4. Restart services. 5. Verify successful installation.

🔧 Temporary Workarounds

Restrict file uploads

all

Configure DOORS Next to restrict file uploads to trusted sources only

Implement file scanning

all

Deploy antivirus/antimalware scanning on DOORS Next server for all uploaded/downloaded files

🧯 If You Can't Patch

  • Implement network segmentation to isolate DOORS Next servers from critical systems
  • Deploy endpoint detection and response (EDR) solutions on all client machines accessing DOORS Next

🔍 How to Verify

Check if Vulnerable:

Check DOORS Next version via administrative console or by examining installation logs

Check Version:

Check IBM Installation Manager or DOORS Next administrative interface for version information

Verify Fix Applied:

Verify interim fix installation through IBM Installation Manager or check version in administrative console

📡 Detection & Monitoring

Log Indicators:

  • Unusual file download patterns
  • Large file transfers from unexpected sources
  • Antivirus alerts on DOORS Next server

Network Indicators:

  • Unexpected outbound connections from DOORS Next server
  • File transfer to suspicious external IPs

SIEM Query:

source="DOORS_Next" AND (event="file_download" OR event="file_upload") AND file_size>100MB

🔗 References

📤 Share & Export