Cyber Security News

IBM Cloud Pak Security Vulnerabilities Expose Sensitive Data to Attackers

IBM recently disclosed a series of significant security vulnerabilities in its Cloud Pak for Business Automation platform, raising alarms about the potential exposure of sensitive data to malicious actors.

The security issues, detailed in an official bulletin published on February 4, 2025, affect multiple versions of the Cloud Pak ecosystem and associated open-source components.

Vulnerabilities Overview

The vulnerabilities span a wide range of components used within the IBM Cloud Pak platform, including Java, Apache libraries, and other open-source dependencies.

Among the most severe issues is CVE-2024-47554, which involves Apache Commons IO and allows attackers to exploit flaws in resource consumption, potentially crashing servers and enabling denial-of-service (DoS) attacks.

Another critical vulnerability, CVE-2024-47764, found in the jshttp cookie module, enables remote attackers to bypass security restrictions and alter cookie fields, posing risks of unauthorized access to sensitive systems.

Additionally, an OpenSSL vulnerability (CVE-2024-5535) involves a buffer over-read flaw, potentially exposing sensitive memory contents during TLS communications. These weaknesses could be exploited further to extract confidential data or elevate privilege levels.

Impact on Cloud Pak Users

Organizations using affected versions of IBM Cloud Pak for Business Automation risk significant operational disruptions and potential breaches. Exploitation of these vulnerabilities could allow attackers to:

  • Steal sensitive data such as user credentials and system configurations.
  • Execute arbitrary code remotely, leading to system compromise.
  • Cause partial or complete service interruptions via sophisticated attacks like DoS.

The bulletin highlights that malicious actors could leverage these attacks to infiltrate and exploit enterprise systems, particularly when unpatched versions remain in use.

Affected Systems and Fixes

The following Cloud Pak versions are impacted:

  • Versions 24.0.0 through 24.0.0-IF003.
  • Earlier versions, including v21.0.3 and v23.0.2.

IBM has released critical fixes, including security patches 24.0.0-IF004 and 21.0.3-IF039, to address these vulnerabilities.

All users of earlier versions are advised to upgrade to the latest version or apply the security iFixes immediately.

IBM urges all customers to perform the following actions:

  1. Apply Patches: Download and apply the security updates available for affected components.
  2. Audit Systems: Conduct a comprehensive review of system security to identify potential exploitation of these vulnerabilities.
  3. Monitor Activity: Establish enhanced monitoring to detect unusual activity in cloud environments.

The vulnerabilities highlight the growing threat posed by unpatched open-source libraries embedded in enterprise solutions.

IBM emphasized the importance of proactive updates and regular security audits to mitigate these risks.

As security concerns continue to rise in highly interconnected enterprise platforms, organizations relying on solutions like IBM Cloud Pak must remain vigilant to maintain robust defenses against sophisticated cyber threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to…

4 minutes ago

Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack

Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable…

7 minutes ago

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.…

1 hour ago

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community…

2 hours ago

Sandworm APT Hackers Weaponize Microsoft KMS Activation Tools To Compromise Windows

In a sophisticated cyber-espionage operation, the Russian state-sponsored hacking group Sandworm (APT44), linked to the…

2 hours ago

Hackers Can Exploit “Wormable” Windows LDAP RCE Vulnerability for Remote Attacks

A critical new vulnerability in Microsoft’s Windows Lightweight Directory Access Protocol (LDAP), tagged as CVE-2025-21376,…

3 hours ago