CVE-2024-49823

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Common Cryptographic Architecture allows authenticated users to send specially crafted valid requests that can cause a denial of service in the Hardware Security Module (HSM). Organizations using IBM CCA versions 7.0.0 through 7.5.51 for cryptographic operations are affected.

💻 Affected Systems

Products:
  • IBM Common Cryptographic Architecture
Versions: 7.0.0 through 7.5.51
Operating Systems: All supported platforms running IBM CCA
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using IBM CCA with HSM functionality. Requires authenticated user access to the cryptographic services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete HSM unavailability, disrupting all cryptographic operations including encryption, decryption, key management, and digital signatures across dependent systems.

🟠

Likely Case

Temporary HSM service disruption requiring manual intervention to restore functionality, impacting cryptographic operations until service is restored.

🟢

If Mitigated

Limited impact with proper authentication controls and request monitoring, potentially causing only brief service interruptions.

🌐 Internet-Facing: LOW - Requires authenticated access and HSM is typically not directly internet-facing.
🏢 Internal Only: MEDIUM - Authenticated internal users could potentially exploit this, but requires specific knowledge of the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the specific request sequence that triggers the DoS condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.52 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7185282

Restart Required: Yes

Instructions:

1. Download IBM CCA version 7.5.52 or later from IBM Fix Central. 2. Stop all cryptographic services using CCA. 3. Apply the update following IBM's installation guide. 4. Restart cryptographic services and verify functionality.

🔧 Temporary Workarounds

Restrict authenticated access

all

Limit which users and applications have authenticated access to the CCA cryptographic services to reduce attack surface.

Implement request rate limiting

all

Configure rate limiting on cryptographic service requests to prevent rapid sequence attacks.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access cryptographic services
  • Monitor HSM performance metrics and set alerts for unusual request patterns or service degradation

🔍 How to Verify

Check if Vulnerable:

Check IBM CCA version using 'cca_version' command or by examining installed packages. Versions 7.0.0 through 7.5.51 are vulnerable.

Check Version:

cca_version

Verify Fix Applied:

After patching, verify version is 7.5.52 or later using 'cca_version' command and test cryptographic operations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual sequence of cryptographic requests from single user
  • HSM service restart events
  • Cryptographic operation failures

Network Indicators:

  • Abnormal pattern of cryptographic API calls
  • Increased request rate to cryptographic services

SIEM Query:

source="cca_logs" AND (event="service_restart" OR event="request_error") | stats count by user, src_ip

🔗 References

📤 Share & Export