CVE-2024-45644

4.7 MEDIUM

📋 TL;DR

This vulnerability allows privileged users in IBM Security ReaQta to upload dangerous file types that can be automatically processed within the product environment. This could lead to remote code execution or system compromise. Only users with administrative or elevated privileges are affected.

💻 Affected Systems

Products:
  • IBM Security ReaQta
Versions: 3.12
Operating Systems: Not specified - likely all supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with privileged user accounts. Requires user to have file upload capabilities within the ReaQta interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker uploads malicious file that executes arbitrary code with system-level privileges, leading to complete system compromise and lateral movement within the environment.

🟠

Likely Case

Malicious insider or compromised privileged account uploads dangerous file types that could execute code, modify configurations, or exfiltrate data from the ReaQta environment.

🟢

If Mitigated

With proper access controls and file validation, impact is limited to denial of service or minor configuration changes within the ReaQta application scope.

🌐 Internet-Facing: LOW - Requires authenticated privileged access to the ReaQta management interface.
🏢 Internal Only: MEDIUM - Internal privileged users or compromised accounts could exploit this vulnerability to gain further access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged access to the ReaQta interface. Attack complexity is low once privileged access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as per IBM Security Advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7186613

Restart Required: Yes

Instructions:

1. Review IBM Security Advisory. 2. Apply the recommended fix from IBM. 3. Restart the ReaQta service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure ReaQta to only accept safe file types and implement file validation

Configuration through ReaQta admin interface - no CLI commands

Privilege Access Management

all

Implement strict access controls and monitoring for privileged accounts

Use IAM tools to restrict and monitor privileged access

🧯 If You Can't Patch

  • Implement strict file upload validation and whitelist only safe file types
  • Enforce least privilege access and monitor all privileged user file upload activities

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Security ReaQta version 3.12 and review privileged user file upload capabilities

Check Version:

Check ReaQta admin interface or configuration files for version information

Verify Fix Applied:

Verify the fix is applied by checking version/configuration and testing file upload restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads by privileged users
  • Execution of unexpected file types
  • File processing errors for dangerous file types

Network Indicators:

  • Unusual file transfers to ReaQta management interface
  • Unexpected outbound connections after file upload

SIEM Query:

source="reaqta" AND (event_type="file_upload" AND file_type NOT IN ("safe_type1","safe_type2"))

🔗 References

📤 Share & Export