CVE-2024-51470

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM MQ allows authenticated users to cause denial-of-service by sending messages with improperly set values. It affects multiple IBM MQ versions across different platforms including LTS, CD, Appliance, and HPE NonStop editions. The issue stems from improper handling of message values that can crash or degrade service.

💻 Affected Systems

Products:
  • IBM MQ
  • IBM MQ Appliance
  • IBM MQ for HPE NonStop
Versions: IBM MQ 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.3 CD, 9.4 LTS, 9.4 CD; IBM MQ Appliance 9.3 LTS, 9.3 CD, 9.4 LTS; IBM MQ for HPE NonStop 8.1.0 through 8.1.0.25
Operating Systems: Multiple platforms including Linux, Windows, AIX, and HPE NonStop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to IBM MQ. All affected versions in default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of IBM MQ, affecting message queuing for dependent applications and potentially causing business process failures.

🟠

Likely Case

Service degradation or temporary unavailability of IBM MQ instances, requiring restart to restore functionality.

🟢

If Mitigated

Minimal impact with proper authentication controls and monitoring in place to detect and block malicious message patterns.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed MQ endpoints could be targeted by authenticated attackers.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but the exploit appears straightforward once access is obtained.

Exploitation requires authenticated access to IBM MQ. The vulnerability is in message handling logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM advisories: APAR IJ50341 for IBM MQ 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.3 CD, 9.4 LTS, 9.4 CD; APAR IJ50342 for IBM MQ Appliance 9.3 LTS, 9.3 CD, 9.4 LTS; APAR IJ50343 for IBM MQ for HPE NonStop 8.1.0 through 8.1.0.25

Vendor Advisory: https://www.ibm.com/support/pages/node/7177593

Restart Required: Yes

Instructions:

1. Review IBM advisories for specific fix versions. 2. Apply appropriate fix packs or interim fixes. 3. Restart IBM MQ services. 4. Verify the fix is applied correctly.

🔧 Temporary Workarounds

Restrict Message Access

all

Implement access controls to limit which authenticated users can send messages to queues.

Use IBM MQ authority records to restrict PUT authority on queues

Message Validation

all

Implement message validation at application level to reject messages with improper values.

Implement message validation in client applications before sending to MQ

🧯 If You Can't Patch

  • Implement strict authentication and authorization controls to limit who can send messages
  • Monitor for unusual message patterns and implement rate limiting on message submission

🔍 How to Verify

Check if Vulnerable:

Check IBM MQ version against affected versions list. Review system logs for message handling errors or service crashes.

Check Version:

dspmqver (on Unix/Linux) or runmqsc DISPLAY QMGR (check version)

Verify Fix Applied:

Verify applied fix version matches IBM advisory requirements. Test message handling with various values to ensure stability.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service termination
  • Message handling errors in AMQERR01.LOG
  • Queue manager crash logs

Network Indicators:

  • Unusual message volume from authenticated users
  • Connection drops to IBM MQ services

SIEM Query:

source="IBM_MQ" AND (event_type="service_crash" OR error_message="message handling")

🔗 References

📤 Share & Export