Tuesday, March 4, 2025
HomeCVE/vulnerabilityFour IBM Zero-days Leaked Online After the Company Refused to Patch The...

Four IBM Zero-days Leaked Online After the Company Refused to Patch The Bugs

Published on

SIEM as a Service

Follow Us on Google News

Security researcher Pedro Ribeiro, Director of Research at Agile Information Security disclosed four zero-day vulnerabilities on GitHub after the company refused to fix them and accept.

The vulnerabilities found with IBM Data Risk Manager (IDRM) enterprise security software, which helps business to uncover, analyze, and visualize data-related business risks.

Four IBM zero-days

While analyzing the IBM Data Risk Manager device researcher found four vulnerabilities, out of the three are critical and one at high risk.

Following are the vulnerabilities

  1. Authentication Bypass
  2. Command Injection
  3. Insecure Default Password
  4. Arbitrary File Download

The first three vulnerabilities chained by attackers allows achieving unauthenticated remote code execution as a root user.

“In addition, two Metasploit modules that bypass authentication and exploit the remote code execution and arbitrary file download are being released to the public,” he added.

Ribeiro confirmed the existence of the vulnerability with version 2.0.3 and he is unclear about the latest version 2.0.6.

“IDRM is an enterprise security product that handles very sensitive information. The hacking of an IDRM the appliance might lead to a full-scale company compromise, as it stores credentials to access other security tools.”

zero-day public Disclosure

IBM said that “we have assessed this report and closed as being out of scope for our vulnerability disclosure program since this product is only for “enhanced” support paid for by our customers.”

According to the policy outlined by IBM in https://hackerone.com/ibm, “to be eligible to participate in this program, you must not be under contract to perform security testing for IBM Corporation or an IBMthe subsidiary, or IBM client within 6 months prior to submitting a report.”

IDM said that “a process error resulted in an improper response to the researcher who reported this situation to IBM.”

By combining vulnerabilities #1, #2 and #3, an unauthenticated user can achieve remote code execution as root – Metasploit Module

If vulnerabilities #1 and #4 are combined, it’s possible for an unauthenticated attacker to download arbitrary files off the system – Metasploit Module.

Bugs Patched

IBM patched two vulnerabilities and working to analyze and identify additional fix actions as needed.

  1. Command Injection Vulnerability in version 2.0.1, 2.0.2 and 2.0.3 is addressed in version 2.0.4
  2. Arbitrary File Download identified in version 2.0.2 and 2.0.3 is addressed in version 2.0.4

To mitigate the vulnerabilities IBM recommended users to upgrade with IDRM version 2.0.6.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read

Multiple Vulnerabilities in IBM QRadar SIEM Allows Attackers to Escalate Privileges and to Execute Arbitrary Commands

IBM Announced that they Acquired Red Hat for $34 Billion

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...