Friday, April 11, 2025
HomeCyber Security NewsVulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

Published on

SIEM as a Service

Follow Us on Google News

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and Queue Manager container images.

These vulnerabilities, including denial of service and privilege escalation, could allow attackers to bypass security restrictions and disrupt operations.

Summary of Vulnerabilities

The bulletin highlights several vulnerabilities affecting the IBM MQ Operator and Queue Manager container images.

- Advertisement - Google News

The key issues are related to Kerberos 5 and IBM MQ, which are susceptible to improper memory allocation and access control flaws.

  1. CVE-2024-40681: This vulnerability allows an authenticated user with a specific role to bypass security restrictions and execute unauthorized actions against the queue manager. It carries a CVSS Base score of 7.5, indicating a high level of severity.
  2. CVE-2024-40680: A local user could exploit this vulnerability to cause a denial of service through improper memory allocation, leading to a segmentation fault. This issue has a CVSS Base score of 6.2.
  3. CVE-2024-37371: This vulnerability involves invalid memory reads during GSS message token handling in MIT Kerberos 5, allowing a remote authenticated attacker to cause a denial of service (DOS). It has a CVSS Base score of 6.5.
  4. CVE-2024-37370: Improper access control in MIT Kerberos 5 could allow a remote attacker to bypass security restrictions, potentially causing the unwrapped token to appear truncated. This vulnerability has a CVSS Base score of 7.4.

The vulnerabilities affect a range of IBM MQ Operator and MQ Advanced container images, including IBM MQ Operator versions from 2.0.0 to 3.2.3 and IBM MQ Advanced Container Images covering various versions from 9.2.0.1 to 9.4.0.0.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Remediation and Fixes

IBM has released patches to address these vulnerabilities:

  • IBM MQ Operator v3.2.4 SC2 includes the updated IBM MQ Advanced 9.4.0.5-r1 container image.
  • IBM MQ Operator v2.0.26 LTS includes the updated IBM MQ Advanced 9.3.0.21-r1 container image.

IBM strongly recommends that users apply the latest container images to mitigate these vulnerabilities.

No Workarounds or Mitigations

Currently, there are no workarounds or mitigations available for these vulnerabilities. Users are urged to update their systems promptly.

IBM encourages users to subscribe to “My Notifications” for updates on important product support alerts. For more information, users can refer to IBM’s Secure Engineering Web Portal and the IBM Product Security Incident Response Blog.

For detailed CVSS scores and further information, visit the IBM X-Force Exchange links in the bulletin.

This security bulletin underscores the importance of timely updates and vigilance in maintaining secure IT environments.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...