Sunday, April 6, 2025
HomeCyber Security NewsVulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

Published on

SIEM as a Service

Follow Us on Google News

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and Queue Manager container images.

These vulnerabilities, including denial of service and privilege escalation, could allow attackers to bypass security restrictions and disrupt operations.

Summary of Vulnerabilities

The bulletin highlights several vulnerabilities affecting the IBM MQ Operator and Queue Manager container images.

The key issues are related to Kerberos 5 and IBM MQ, which are susceptible to improper memory allocation and access control flaws.

  1. CVE-2024-40681: This vulnerability allows an authenticated user with a specific role to bypass security restrictions and execute unauthorized actions against the queue manager. It carries a CVSS Base score of 7.5, indicating a high level of severity.
  2. CVE-2024-40680: A local user could exploit this vulnerability to cause a denial of service through improper memory allocation, leading to a segmentation fault. This issue has a CVSS Base score of 6.2.
  3. CVE-2024-37371: This vulnerability involves invalid memory reads during GSS message token handling in MIT Kerberos 5, allowing a remote authenticated attacker to cause a denial of service (DOS). It has a CVSS Base score of 6.5.
  4. CVE-2024-37370: Improper access control in MIT Kerberos 5 could allow a remote attacker to bypass security restrictions, potentially causing the unwrapped token to appear truncated. This vulnerability has a CVSS Base score of 7.4.

The vulnerabilities affect a range of IBM MQ Operator and MQ Advanced container images, including IBM MQ Operator versions from 2.0.0 to 3.2.3 and IBM MQ Advanced Container Images covering various versions from 9.2.0.1 to 9.4.0.0.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Remediation and Fixes

IBM has released patches to address these vulnerabilities:

  • IBM MQ Operator v3.2.4 SC2 includes the updated IBM MQ Advanced 9.4.0.5-r1 container image.
  • IBM MQ Operator v2.0.26 LTS includes the updated IBM MQ Advanced 9.3.0.21-r1 container image.

IBM strongly recommends that users apply the latest container images to mitigate these vulnerabilities.

No Workarounds or Mitigations

Currently, there are no workarounds or mitigations available for these vulnerabilities. Users are urged to update their systems promptly.

IBM encourages users to subscribe to “My Notifications” for updates on important product support alerts. For more information, users can refer to IBM’s Secure Engineering Web Portal and the IBM Product Security Incident Response Blog.

For detailed CVSS scores and further information, visit the IBM X-Force Exchange links in the bulletin.

This security bulletin underscores the importance of timely updates and vigilance in maintaining secure IT environments.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...