CVE-2024-45097

5.9 MEDIUM

📋 TL;DR

IBM Aspera Faspex versions 5.0.0 through 5.0.9 contain an access control bypass vulnerability that allows authenticated users to modify resources beyond their intended permissions. This affects organizations using these versions of IBM's high-speed file transfer solution. The vulnerability stems from improper access restrictions that fail to properly enforce user privileges.

💻 Affected Systems

Products:
  • IBM Aspera Faspex
Versions: 5.0.0 through 5.0.9
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; all deployments running affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious user could modify critical system resources, potentially disrupting file transfer operations, altering configuration settings, or accessing unauthorized data.

🟠

Likely Case

An authenticated user could modify resources they shouldn't have access to, potentially affecting other users' transfers or system functionality.

🟢

If Mitigated

With proper network segmentation and minimal user privileges, impact would be limited to specific resources within the user's access scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; the vulnerability involves bypassing access controls rather than complex technical manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.10 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7167255

Restart Required: Yes

Instructions:

1. Download IBM Aspera Faspex 5.0.10 or later from IBM Fix Central
2. Backup current configuration and data
3. Stop Aspera Faspex services
4. Apply the update following IBM's installation guide
5. Restart services and verify functionality

🔧 Temporary Workarounds

Restrict User Privileges

all

Apply principle of least privilege to all user accounts to limit potential impact

Network Segmentation

all

Isolate Aspera Faspex servers from critical infrastructure and limit access to trusted networks

🧯 If You Can't Patch

  • Implement strict access controls and audit all user permissions
  • Monitor system logs for unauthorized resource modification attempts
  • Consider temporary workarounds while planning upgrade

🔍 How to Verify

Check if Vulnerable:

Check Aspera Faspex version via web interface or configuration files; versions 5.0.0-5.0.9 are vulnerable

Check Version:

Check web interface or aspera.conf for version information

Verify Fix Applied:

Verify version is 5.0.10 or later and test access controls for proper enforcement

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized resource modification attempts
  • Access control violation logs
  • User performing actions beyond their role

Network Indicators:

  • Unusual API calls to resource modification endpoints
  • Patterns of access to restricted resources

SIEM Query:

source="aspera_faspex" AND (event_type="access_violation" OR resource_modification="unauthorized")

🔗 References

📤 Share & Export