CVE-2024-47120

6.4 MEDIUM

📋 TL;DR

This vulnerability in IBM Security Verify Information Queue allows privileged users to escalate their privileges and expand their attack surface on the host system. The containers run with unnecessary privileges, enabling potential host compromise. Affected versions are 10.0.5 through 10.0.8.

💻 Affected Systems

Products:
  • IBM Security Verify Information Queue
Versions: 10.0.5, 10.0.6, 10.0.7, 10.0.8
Operating Systems: All platforms running affected IBM Security Verify Information Queue
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where containers are running with unnecessary privileges; requires privileged user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A privileged user could gain full control of the host system, potentially compromising the entire infrastructure and accessing sensitive data.

🟠

Likely Case

Privileged users could escalate their permissions beyond intended boundaries, gaining unauthorized access to host resources and other containers.

🟢

If Mitigated

With proper privilege separation and container security controls, the impact would be limited to the container environment only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires existing privileged access to the IBM Security Verify Information Queue system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the fix as described in IBM Security Bulletin 7244514

Vendor Advisory: https://www.ibm.com/support/pages/node/7244514

Restart Required: No

Instructions:

1. Review IBM Security Bulletin 7244514. 2. Apply the recommended fix or upgrade to a non-vulnerable version. 3. Verify container privileges are properly configured.

🔧 Temporary Workarounds

Reduce Container Privileges

all

Configure containers to run with minimal necessary privileges instead of elevated permissions

Review and modify container runtime configurations to remove unnecessary capabilities and privileges

🧯 If You Can't Patch

  • Implement strict access controls to limit privileged user access to IBM Security Verify Information Queue
  • Monitor container runtime activities and privilege escalation attempts through security logging

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Security Verify Information Queue version 10.0.5, 10.0.6, 10.0.7, or 10.0.8

Check Version:

Check IBM Security Verify Information Queue administration interface or configuration files for version information

Verify Fix Applied:

Verify container configurations no longer run with unnecessary privileges and check version is updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts within containers
  • Container processes running with unexpected privileges
  • Changes to container runtime configurations

Network Indicators:

  • Unusual outbound connections from container hosts
  • Network traffic patterns suggesting host compromise

SIEM Query:

container_privilege_escalation OR ibm_security_verify_privilege_escalation

🔗 References

📤 Share & Export