CVE-2024-51450

9.1 CRITICAL

📋 TL;DR

CVE-2024-51450 is an OS command injection vulnerability in IBM Security Verify Directory that allows authenticated remote attackers to execute arbitrary commands on affected systems. This affects IBM Security Verify Directory versions 10.0.0 through 10.0.3. Attackers can potentially gain full control of the server.

💻 Affected Systems

Products:
  • IBM Security Verify Directory
Versions: 10.0.0 through 10.0.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but default configurations may be vulnerable if standard authentication is used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/administrator privileges, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker gains shell access to the server, can read sensitive directory data, modify configurations, and potentially pivot to other systems.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges, and proper monitoring detecting exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.4 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7182558

Restart Required: Yes

Instructions:

1. Download IBM Security Verify Directory 10.0.4 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Stop the directory service. 4. Apply the update following IBM installation documentation. 5. Restart the directory service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to IBM Security Verify Directory to only trusted IP addresses and networks.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 389 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 389 -j DROP

Authentication Hardening

all

Implement multi-factor authentication and strong password policies to reduce risk of credential compromise.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to only necessary users and systems.
  • Enable detailed logging and monitoring for suspicious authentication attempts and command execution patterns.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Security Verify Directory using the product's administrative interface or version command.

Check Version:

On Linux: /opt/ibm/ldap/V10.0/bin/idsversion or check the product administrative console.

Verify Fix Applied:

Verify the version is 10.0.4 or later and test that the directory service functions normally after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Unexpected command execution in system logs
  • Abnormal process creation from directory service

Network Indicators:

  • Suspicious LDAP queries with shell metacharacters
  • Unexpected outbound connections from directory server

SIEM Query:

source="ibm_verify_directory" AND (event_type="authentication" AND result="failure" AND count>10) OR (process_name CONTAINS "cmd" OR "sh" OR "bash")

🔗 References

📤 Share & Export