CVE-2024-45640
📋 TL;DR
IBM Security ReaQta 3.12 discloses sensitive information in HTTP responses that could aid attackers in reconnaissance or further exploitation. This affects organizations using IBM Security ReaQta 3.12 for endpoint detection and response. The vulnerability exposes system details that could facilitate targeted attacks.
💻 Affected Systems
- IBM Security ReaQta
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain critical system information enabling privilege escalation, lateral movement, or complete system compromise through chained attacks.
Likely Case
Information disclosure provides attackers with reconnaissance data about the ReaQta deployment, making subsequent attacks more targeted and effective.
If Mitigated
With proper network segmentation and access controls, impact is limited to information disclosure without direct system compromise.
🎯 Exploit Status
Exploitation requires access to HTTP responses from the ReaQta system, typically through network access or user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply fix as per IBM advisory
Vendor Advisory: https://www.ibm.com/support/pages/node/7180313
Restart Required: Yes
Instructions:
1. Review IBM advisory at provided URL. 2. Apply recommended fix or update. 3. Restart affected services. 4. Verify fix implementation.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to IBM Security ReaQta to trusted IPs only
Web Application Firewall Rules
allConfigure WAF to filter or block sensitive information in HTTP responses
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ReaQta systems
- Monitor HTTP traffic for unusual patterns or information disclosure
🔍 How to Verify
Check if Vulnerable:
Test HTTP responses from ReaQta 3.12 for sensitive information disclosure
Check Version:
Check ReaQta version in administration interface or via system commands
Verify Fix Applied:
Verify HTTP responses no longer contain sensitive information after applying fix
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP request patterns to ReaQta endpoints
- Multiple failed authentication attempts followed by information requests
Network Indicators:
- HTTP traffic to ReaQta containing unusual response patterns
- External IPs accessing ReaQta interfaces
SIEM Query:
source="reaqta" AND (http_response_size > threshold OR http_response_contains_sensitive_pattern)