CVE-2024-56346

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in IBM AIX's nimesis NIM master service allows remote attackers to execute arbitrary commands on affected systems due to improper process controls. Systems running IBM AIX 7.2 or 7.3 with the vulnerable NIM service are at risk of complete compromise.

💻 Affected Systems

Products:
  • IBM AIX
Versions: 7.2, 7.3
Operating Systems: IBM AIX
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with nimesis NIM master service enabled. NIM (Network Installation Manager) is commonly used for AIX system administration and deployment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to privilege escalation, credential harvesting, and installation of malicious payloads on vulnerable AIX systems.

🟢

If Mitigated

Limited impact if service is not exposed to untrusted networks and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 10.0 indicates trivial exploitation with no authentication required. Remote attackers can trigger the vulnerability without user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the security fix from IBM's advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7186621

Restart Required: Yes

Instructions:

1. Download the appropriate fix from IBM Fix Central. 2. Apply the fix using smitty or installp command. 3. Restart affected services or reboot system as required.

🔧 Temporary Workarounds

Disable NIM Master Service

aix

Temporarily disable the vulnerable nimesis NIM master service if not required

stopsrc -s nimesis
chssys -s nimesis -d

Network Access Control

all

Restrict network access to NIM service ports using firewall rules

iptables -A INPUT -p tcp --dport [NIM_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AIX systems from untrusted networks
  • Deploy host-based intrusion detection and monitor for suspicious process execution

🔍 How to Verify

Check if Vulnerable:

Check if AIX version is 7.2 or 7.3 and nimesis service is running: lssrc -s nimesis

Check Version:

oslevel -s

Verify Fix Applied:

Verify fix installation: lslpp -L | grep -i nimesis and check service status

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from nimesis service
  • Failed authentication attempts to NIM service
  • Suspicious network connections to NIM ports

Network Indicators:

  • Unexpected traffic to NIM service ports (typically 1058/tcp)
  • Anomalous outbound connections from AIX systems

SIEM Query:

source="aix_logs" AND (process="nimesis" OR port=1058) AND (event_type="process_execution" OR event_type="network_connection")

🔗 References

📤 Share & Export