CVE-2024-55898

8.5 HIGH

📋 TL;DR

This vulnerability allows users with program compilation or restoration capabilities on IBM i systems to gain elevated privileges through an unqualified library call. Attackers could execute user-controlled code with administrator privileges, affecting IBM i versions 7.2 through 7.5.

💻 Affected Systems

Products:
  • IBM i
Versions: 7.2, 7.3, 7.4, 7.5
Operating Systems: IBM i
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to have program compilation or restoration capabilities; not all users are affected by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing data theft, system modification, or persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive data and system resources within the IBM i environment.

🟢

If Mitigated

Limited impact if proper access controls restrict program compilation/restoration capabilities to trusted administrators only.

🌐 Internet-Facing: LOW - IBM i systems are typically internal enterprise systems, not directly internet-facing.
🏢 Internal Only: HIGH - Internal users with program compilation privileges could exploit this to gain administrative control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with specific privileges; exploitation involves manipulating library calls during program compilation/restoration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM i Group PTFs as specified in the advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7183835

Restart Required: No

Instructions:

1. Review IBM advisory for specific PTF numbers. 2. Apply the appropriate PTFs for your IBM i version. 3. Verify installation using DSPPTF command.

🔧 Temporary Workarounds

Restrict program compilation privileges

IBM i

Limit users who can compile or restore programs to only trusted administrators

GRTOBJAUT OBJ(QSYS/*ALL) OBJTYPE(*PGM) USER(trusted_admin) AUT(*ALL)
RVKOBJAUT OBJ(QSYS/*ALL) OBJTYPE(*PGM) USER(untrusted_user) AUT(*ALL)

🧯 If You Can't Patch

  • Implement strict access controls to limit program compilation/restoration capabilities to essential personnel only
  • Monitor audit logs for unusual program compilation or restoration activities

🔍 How to Verify

Check if Vulnerable:

Check IBM i version with DSPPTF command and compare against advisory PTF requirements

Check Version:

DSPPTF

Verify Fix Applied:

Verify PTF installation using DSPPTF command and ensure required PTFs are applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual program compilation or restoration activities
  • Privilege escalation attempts in audit journals

Network Indicators:

  • N/A - This is a local privilege escalation vulnerability

SIEM Query:

Search for program compilation events (CPYSRCF, CRTPGM, RSTOBJ) from non-administrative users

🔗 References

📤 Share & Export