CVE-2025-1142

5.4 MEDIUM

📋 TL;DR

IBM Edge Application Manager 4.5 contains a server-side request forgery (SSRF) vulnerability that allows authenticated attackers to make unauthorized requests from the system. This could enable network scanning or serve as a stepping stone for further attacks. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM Edge Application Manager
Versions: 4.5
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects IBM Edge Application Manager 4.5. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains internal network access, performs lateral movement, accesses sensitive internal services, or combines with other vulnerabilities for full system compromise.

🟠

Likely Case

Attacker maps internal network structure, accesses metadata services, or interacts with internal APIs to gather information for further attacks.

🟢

If Mitigated

Limited to authenticated users only, with network segmentation preventing access to critical internal systems.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if exposed to internet with compromised credentials.
🏢 Internal Only: MEDIUM - Authenticated internal users could abuse this for network reconnaissance or accessing other internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the SSRF vector. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as per IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7242632

Restart Required: No

Instructions:

1. Review IBM advisory at provided URL. 2. Apply the recommended fix or update. 3. Verify the fix is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from IBM Edge Application Manager to only necessary destinations

Access Control Review

all

Review and tighten authentication controls to minimize attack surface

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit outbound connections
  • Enhance authentication monitoring and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Edge Application Manager version 4.5. Review configuration for SSRF-prone endpoints.

Check Version:

Check IBM Edge Application Manager version through administrative interface or configuration files

Verify Fix Applied:

Verify patch is applied by checking version and testing SSRF vectors are no longer exploitable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from application server
  • Requests to internal IP addresses or metadata services
  • Multiple failed authentication attempts followed by SSRF-like requests

Network Indicators:

  • Unexpected outbound connections from application server to internal network segments
  • Requests to cloud metadata endpoints (169.254.169.254, etc.)

SIEM Query:

source="ibm-edge-app-manager" AND (dest_ip=169.254.169.254 OR dest_ip IN [internal_ranges])

🔗 References

📤 Share & Export