CVE-2024-51464

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated IBM i users to bypass interface restrictions in Navigator for i by sending specially crafted requests. Attackers could perform unauthorized operations that their assigned permissions should prevent. Affects IBM i versions 7.3, 7.4, and 7.5.

💻 Affected Systems

Products:
  • IBM i Navigator
Versions: 7.3, 7.4, 7.5
Operating Systems: IBM i
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Navigator for i interface to be accessible and user authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains administrative privileges and performs unauthorized system operations, data manipulation, or configuration changes.

🟠

Likely Case

Privilege escalation allowing users to perform operations beyond their assigned role permissions.

🟢

If Mitigated

Limited impact due to existing access controls and monitoring catching unusual activity.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if Navigator for i is exposed to internet.
🏢 Internal Only: HIGH - Internal authenticated users could exploit to bypass permission controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of crafting specific requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM i PTF Group SF99730 Level 30 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7179509

Restart Required: Yes

Instructions:

1. Check current PTF level with DSPPTF. 2. Apply PTF Group SF99730 Level 30 or later. 3. Restart affected services or system as required.

🔧 Temporary Workarounds

Restrict Navigator for i Access

all

Limit access to Navigator for i interface to only trusted users and networks.

Configure firewall rules to restrict access to Navigator for i ports
Use IBM i network attributes to limit interface access

Implement Least Privilege

all

Ensure users have only necessary permissions to reduce impact if exploited.

Use GRTOBJAUT and RVKOBJAUT commands to manage object authorities
Regularly review user profiles with DSPUSRPRF

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IBM i systems
  • Enhance monitoring of Navigator for i access logs for unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check IBM i version with WRKACTJOB SBS(QSYSWRK) and verify if running 7.3, 7.4, or 7.5 without required PTFs.

Check Version:

DSPPTF LICPGM(5770SS1) or WRKACTJOB SBS(QSYSWRK)

Verify Fix Applied:

Verify PTF Group SF99730 Level 30 or later is installed using DSPPTF command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Navigator for i access patterns
  • Authorization failures followed by successful operations
  • User performing operations outside normal role

Network Indicators:

  • Suspicious requests to Navigator for i interface
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="IBM_i" AND (event_type="authorization_failure" OR event_type="privilege_escalation") AND application="Navigator_for_i"

🔗 References

📤 Share & Export