CVE-2024-45673

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local users to read stored user credentials from configuration files in affected IBM Security products. It affects IBM Security Verify Bridge Directory Sync, IBM Security Verify Gateway for Windows Login, and IBM Security Verify Gateway for Radius. Attackers with local access can potentially obtain sensitive authentication data.

💻 Affected Systems

Products:
  • IBM Security Verify Bridge Directory Sync
  • IBM Security Verify Gateway for Windows Login
  • IBM Security Verify Gateway for Radius
Versions: 1.0.1 through 1.0.12 for Bridge Directory Sync, 1.0.1 through 1.0.10 for Windows Login Gateway, 1.0.1 through 1.0.11 for Radius Gateway
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations within affected version ranges are vulnerable. Credentials are stored in cleartext or weakly protected formats in configuration files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers gain administrative credentials, leading to complete system compromise, lateral movement, and privilege escalation across connected systems.

🟠

Likely Case

Local users or malware with file read access harvest credentials for authentication bypass, data exfiltration, or limited privilege escalation.

🟢

If Mitigated

With proper access controls, only authorized administrators can access configuration files, limiting exposure to trusted personnel.

🌐 Internet-Facing: LOW - This is a local file read vulnerability requiring local system access.
🏢 Internal Only: HIGH - Internal users with local access can exploit this to gain credentials and escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local file read access but is trivial once access is obtained. No special tools or skills needed beyond basic file reading capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Bridge Directory Sync 1.0.13, Windows Login Gateway 1.0.11, Radius Gateway 1.0.12

Vendor Advisory: https://www.ibm.com/support/pages/node/7183801

Restart Required: Yes

Instructions:

1. Download the latest version from IBM Fix Central. 2. Backup current configuration. 3. Stop the affected service. 4. Install the updated version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict Configuration File Permissions

linux

Set strict file permissions on configuration files to prevent unauthorized local users from reading them.

chmod 600 /path/to/config/files/*.conf
chown root:root /path/to/config/files/*.conf

Windows ACL Restriction

windows

Apply NTFS permissions to restrict configuration file access to administrators only.

icacls "C:\Program Files\IBM\config\*.conf" /inheritance:r /grant:r "Administrators:(F)" /grant:r "SYSTEM:(F)"

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to systems running affected software.
  • Regularly audit and monitor access to configuration files and credential storage locations.

🔍 How to Verify

Check if Vulnerable:

Check version numbers in product administration console or via 'ibm_version' command. If within affected ranges, check configuration file permissions and contents for stored credentials.

Check Version:

ibm_version or check product administration interface

Verify Fix Applied:

Verify installed version is patched (1.0.13+ for Bridge Directory Sync, 1.0.11+ for Windows Login Gateway, 1.0.12+ for Radius Gateway). Confirm configuration files no longer contain readable credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to configuration files
  • Failed authentication attempts using harvested credentials
  • Unusual local user activity on affected systems

Network Indicators:

  • Unusual authentication patterns from affected systems
  • Credential reuse across different systems

SIEM Query:

source="*config*" AND (event="FileRead" OR event="AccessDenied") AND file_path="*conf*" AND user!="admin"

🔗 References

📤 Share & Export