CVE-2024-43187

5.9 MEDIUM

📋 TL;DR

IBM Security Verify Access Appliance and Container versions 10.0.0 through 10.0.8 transmit sensitive data in cleartext over network channels, allowing unauthorized actors to intercept and read security-critical information. This affects organizations using these specific IBM security products for identity and access management.

💻 Affected Systems

Products:
  • IBM Security Verify Access Appliance
  • IBM Security Verify Access Container
Versions: 10.0.0 through 10.0.8
Operating Systems: Linux-based appliance OS, Container platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both appliance and container deployments; vulnerability exists in default configurations where cleartext transmission occurs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept authentication credentials, session tokens, or configuration data, leading to account compromise, privilege escalation, or complete system takeover.

🟠

Likely Case

Unauthorized actors sniff network traffic to obtain sensitive information like user credentials or session data, enabling unauthorized access to protected resources.

🟢

If Mitigated

With proper network segmentation and encryption controls, impact is limited to isolated network segments with minimal exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to sniff traffic; no authentication needed to intercept cleartext data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.9 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7182386

Restart Required: Yes

Instructions:

1. Download IBM Security Verify Access version 10.0.9 or later from IBM Fix Central. 2. Apply the update following IBM's upgrade documentation. 3. Restart the appliance or container services. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Enable TLS Encryption

all

Configure all network communications to use TLS encryption to prevent cleartext transmission.

Configure TLS in IBM Security Verify Access administration console

Network Segmentation

all

Isolate IBM Security Verify Access systems to trusted network segments with limited access.

Implement firewall rules to restrict network access to trusted IPs only

🧯 If You Can't Patch

  • Implement network-level encryption (VPN/IPsec) for all communications involving IBM Security Verify Access
  • Deploy network monitoring and intrusion detection to alert on cleartext transmission attempts

🔍 How to Verify

Check if Vulnerable:

Check current version via IBM administration console or command: 'version' command in appliance CLI

Check Version:

ssh admin@<appliance-ip> version

Verify Fix Applied:

Verify version is 10.0.9 or later and test network communications to confirm encryption is enabled

📡 Detection & Monitoring

Log Indicators:

  • Cleartext authentication attempts
  • Unencrypted protocol usage logs

Network Indicators:

  • Cleartext HTTP traffic to/from IBM Security Verify Access systems
  • Unencrypted LDAP or other protocol traffic

SIEM Query:

source="ibm-verify-access" AND (protocol="http" OR protocol="ldap" NOT protocol="ldaps" OR protocol="tls")

🔗 References

📤 Share & Export