CVE-2024-55897

4.3 MEDIUM

📋 TL;DR

IBM PowerHA SystemMirror for i fails to set the secure attribute on authorization tokens and session cookies, allowing attackers to steal these cookies via HTTP links. This affects IBM PowerHA SystemMirror for i versions 7.4 and 7.5. Attackers can intercept cookie values by tricking users into visiting HTTP links or planting malicious links.

💻 Affected Systems

Products:
  • IBM PowerHA SystemMirror for i
Versions: 7.4, 7.5
Operating Systems: IBM i (formerly OS/400)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configurations where HTTP access is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session cookies and gain unauthorized access to PowerHA management interfaces, potentially compromising high-availability configurations and sensitive system data.

🟠

Likely Case

Session hijacking leading to unauthorized access to PowerHA management functions, though limited to users who click malicious HTTP links.

🟢

If Mitigated

Minimal impact if HTTPS-only enforcement and network segmentation prevent HTTP cookie transmission.

🌐 Internet-Facing: MEDIUM - Systems exposed to internet are vulnerable if users access via HTTP, but exploitation requires user interaction.
🏢 Internal Only: LOW - Internal networks typically have better controls, but risk exists if internal users access via HTTP.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking HTTP link) and network interception capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM fix as per advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7180036

Restart Required: Yes

Instructions:

1. Review IBM advisory. 2. Apply recommended fix from IBM. 3. Restart affected services. 4. Verify secure attribute is set on cookies.

🔧 Temporary Workarounds

Enforce HTTPS Only

all

Configure PowerHA to use HTTPS exclusively and disable HTTP access.

Configure HTTP to HTTPS redirection in PowerHA settings
Disable HTTP protocol in PowerHA configuration

Network Segmentation

all

Restrict access to PowerHA management interfaces to trusted networks only.

Configure firewall rules to limit PowerHA access
Implement VLAN segmentation for management traffic

🧯 If You Can't Patch

  • Enforce HTTPS-only access and disable HTTP completely.
  • Implement strict network controls to prevent unauthorized access to PowerHA interfaces.

🔍 How to Verify

Check if Vulnerable:

Check if PowerHA session cookies lack the 'Secure' attribute when accessed via HTTP.

Check Version:

DSPPTF LICPGM(5770SS1) for IBM i version check

Verify Fix Applied:

Verify cookies have 'Secure' attribute set and HTTP access is disabled or redirected to HTTPS.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP access to PowerHA interfaces
  • Multiple failed authentication attempts

Network Indicators:

  • HTTP traffic to PowerHA ports containing session cookies
  • Unencrypted cookie transmission

SIEM Query:

source="PowerHA" AND (protocol="HTTP" AND uri CONTAINS "session")

🔗 References

📤 Share & Export