CVE-2024-45097
📋 TL;DR
IBM Aspera Faspex versions 5.0.0 through 5.0.9 contain an access control bypass vulnerability that allows authenticated users to modify resources beyond their intended permissions. This affects organizations using these versions of IBM's high-speed file transfer solution. The vulnerability stems from improper access restrictions that fail to properly enforce user privileges.
💻 Affected Systems
- IBM Aspera Faspex
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious user could modify critical system resources, potentially disrupting file transfer operations, altering configuration settings, or accessing unauthorized data.
Likely Case
An authenticated user could modify resources they shouldn't have access to, potentially affecting other users' transfers or system functionality.
If Mitigated
With proper network segmentation and minimal user privileges, impact would be limited to specific resources within the user's access scope.
🎯 Exploit Status
Exploitation requires authenticated access; the vulnerability involves bypassing access controls rather than complex technical manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.0.10 or later
Vendor Advisory: https://www.ibm.com/support/pages/node/7167255
Restart Required: Yes
Instructions:
1. Download IBM Aspera Faspex 5.0.10 or later from IBM Fix Central
2. Backup current configuration and data
3. Stop Aspera Faspex services
4. Apply the update following IBM's installation guide
5. Restart services and verify functionality
🔧 Temporary Workarounds
Restrict User Privileges
allApply principle of least privilege to all user accounts to limit potential impact
Network Segmentation
allIsolate Aspera Faspex servers from critical infrastructure and limit access to trusted networks
🧯 If You Can't Patch
- Implement strict access controls and audit all user permissions
- Monitor system logs for unauthorized resource modification attempts
- Consider temporary workarounds while planning upgrade
🔍 How to Verify
Check if Vulnerable:
Check Aspera Faspex version via web interface or configuration files; versions 5.0.0-5.0.9 are vulnerable
Check Version:
Check web interface or aspera.conf for version information
Verify Fix Applied:
Verify version is 5.0.10 or later and test access controls for proper enforcement
📡 Detection & Monitoring
Log Indicators:
- Unauthorized resource modification attempts
- Access control violation logs
- User performing actions beyond their role
Network Indicators:
- Unusual API calls to resource modification endpoints
- Patterns of access to restricted resources
SIEM Query:
source="aspera_faspex" AND (event_type="access_violation" OR resource_modification="unauthorized")