CVE-2024-45653

4.3 MEDIUM

📋 TL;DR

IBM Sterling Connect:Direct Web Services versions 6.0-6.3 expose sensitive IP address information to authenticated users in API responses. This information disclosure vulnerability could enable attackers to gather intelligence for further attacks against the system. Only authenticated users can trigger this vulnerability.

💻 Affected Systems

Products:
  • IBM Sterling Connect:Direct Web Services
Versions: 6.0, 6.1, 6.2, 6.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default. Requires authenticated user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain internal IP addresses and network topology information, enabling targeted attacks against backend systems, lateral movement, or reconnaissance for more severe exploits.

🟠

Likely Case

Authenticated attackers gather internal IP addresses to map network architecture and identify additional targets for exploitation within the environment.

🟢

If Mitigated

With proper network segmentation and access controls, the exposed information provides limited value to attackers who cannot reach the disclosed systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web services interface. The vulnerability involves analyzing API responses for leaked IP information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 6.3.0.2 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7174104

Restart Required: Yes

Instructions:

1. Download the interim fix from IBM Fix Central. 2. Stop the Connect:Direct Web Services application. 3. Apply the fix according to IBM documentation. 4. Restart the application. 5. Verify the fix by checking version and testing API responses.

🔧 Temporary Workarounds

Restrict API Access

all

Limit which authenticated users can access the vulnerable API endpoints to reduce exposure.

Configure application-level access controls to restrict API endpoint access to only necessary users

Network Segmentation

all

Implement network controls to limit what systems can be reached from the disclosed IP addresses.

Configure firewall rules to restrict access to backend systems from unauthorized networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Connect:Direct Web Services from sensitive backend systems
  • Enhance monitoring of API access logs for unusual patterns of authenticated users accessing multiple endpoints

🔍 How to Verify

Check if Vulnerable:

As an authenticated user, access Connect:Direct Web Services API endpoints and check responses for internal IP addresses that should not be exposed.

Check Version:

Check the application version through the administrative interface or by examining installation directories and configuration files.

Verify Fix Applied:

After applying the fix, test the same API endpoints as an authenticated user and verify that internal IP addresses are no longer disclosed in responses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of API requests from authenticated users, particularly sequential requests to multiple endpoints

Network Indicators:

  • Increased API traffic from single authenticated users scanning multiple endpoints

SIEM Query:

source="connect_direct_ws" AND (event_type="api_request" AND user="*" AND endpoint_count > threshold)

🔗 References

📤 Share & Export