CVE-2024-45075

8.8 HIGH

📋 TL;DR

CVE-2024-45075 is an authentication bypass vulnerability in IBM webMethods Integration 10.15 that allows authenticated users to create scheduler tasks and escalate privileges to administrator level. This affects organizations using IBM webMethods Integration 10.15 where users have authenticated access to the system.

💻 Affected Systems

Products:
  • IBM webMethods Integration
Versions: 10.15
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects all deployments of version 10.15 regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrative control over the webMethods Integration system, potentially compromising all integration processes, accessing sensitive data, and executing arbitrary code.

🟠

Likely Case

Malicious insiders or compromised user accounts escalate privileges to administrator level, enabling unauthorized access to business integration data and system configuration.

🟢

If Mitigated

With proper network segmentation and least privilege access controls, impact is limited to the specific webMethods Integration instance.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7167245

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL
2. Download and apply the appropriate interim fix
3. Restart webMethods Integration services
4. Verify the fix is applied successfully

🔧 Temporary Workarounds

Restrict Scheduler Task Creation

all

Limit which authenticated users can create scheduler tasks through role-based access controls

Configure webMethods Integration security roles to restrict scheduler task creation to administrators only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate webMethods Integration from other critical systems
  • Enforce least privilege access controls and regularly audit user permissions

🔍 How to Verify

Check if Vulnerable:

Check if running IBM webMethods Integration version 10.15 using the product's version command or administration console

Check Version:

Check webMethods Integration administration console or product documentation for version verification command

Verify Fix Applied:

Verify the applied interim fix version matches the fix specified in IBM advisory and test that authenticated users cannot create unauthorized scheduler tasks

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized scheduler task creation events
  • User privilege escalation attempts
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual API calls to scheduler task endpoints from non-admin users

SIEM Query:

source="webmethods" AND (event="scheduler_create" OR event="privilege_escalation") AND user_role!="admin"

🔗 References

📤 Share & Export