CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-51450

Critical Severity
SVRS
82/100

CVSSv3
9.1/10

EPSS
0.00077/1

CVE-2024-51450 is a critical vulnerability in IBM Security Verify Directory that allows remote attackers to execute arbitrary commands. With an SVRS of 82, this IBM Security Verify Directory flaw demands immediate attention. The vulnerability, present in versions 10.0.0 through 10.0.3, stems from insufficient input validation, enabling an authenticated attacker to send a specially crafted request to execute commands. Given the high SVRS, this vulnerability is considered actively exploited or likely to be exploited soon, making remediation urgent. Successful exploitation could lead to complete system compromise, data theft, or denial of service. Organizations using affected versions of IBM Security Verify Directory should apply the necessary patches immediately to mitigate the risk. The potential for arbitrary command execution makes this a significant threat requiring swift action.

Vendor-advisory
In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:H
I:H
A:H
2025-02-06

2025-02-22
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-51450 affects IBM Security Verify Directory versions 10.0.0 through 10.0.3. This vulnerability allows a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. This vulnerability leverages a flaw in the application's handling of user input, potentially leading to remote code execution.

SVRS: 34 While the CVSS score is high (9.1), the SVRS score of 34 indicates that although the vulnerability is potentially serious, it's not yet being actively exploited in the wild. This doesn't mean it won't be exploited, but it suggests a lower immediate urgency for action.

Key Insights

  • Remote Code Execution (RCE): The most critical aspect of this vulnerability is the possibility of remote code execution. An attacker could gain complete control over the affected system.
  • Authenticated Attacker: This vulnerability requires the attacker to have valid credentials. This means that attackers must first compromise user accounts or gain unauthorized access to the system before exploiting this vulnerability.
  • In The Wild: This vulnerability is tagged "In The Wild," indicating that it's actively being exploited by threat actors. This highlights the critical need for immediate action to prevent potential breaches.
  • CWE-78: This CVE is categorized under CWE-78, "Improper Neutralization of Special Characters in Output During Web Page Generation ('Cross-site Scripting')". This means the vulnerability arises from how the application handles user input, making it susceptible to cross-site scripting attacks.

Mitigation Strategies

  1. Patching: Immediately apply the latest security patches released by IBM for IBM Security Verify Directory. These patches should address the vulnerabilities described in CVE-2024-51450.
  2. Access Control and Security Practices: Review and strengthen existing access controls for the affected systems. Implement the principle of least privilege and enforce multi-factor authentication.
  3. Web Application Firewall (WAF): Consider deploying or strengthening your existing WAF to detect and block malicious requests targeting this vulnerability. WAFs can help prevent cross-site scripting attacks by filtering out malicious input before it reaches the server.
  4. Security Monitoring: Intensify your security monitoring for any suspicious activity related to the affected systems. Look for unusual login attempts, unexpected data access, or changes in user behavior.

Additional Information:

If you have additional queries regarding this incident, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-51450 | IBM Security Verify Directory up to 10.0.3 Request os command injection
vuldb.com2025-02-06
CVE-2024-51450 | IBM Security Verify Directory up to 10.0.3 Request os command injection | A vulnerability was found in IBM Security Verify Directory up to 10.0.3. It has been declared as critical. This vulnerability affects unknown code of the component Request Handler. The manipulation leads to os command injection. This vulnerability was named CVE-2024-51450. The attack can be initiated remotely. There is
vuldb.com
rss
forum
news

Social Media

CVE-2024-51450 (CVSS:9.1, Severity: Critical, More Details: https://t.co/b17ub9FRmy) IBM Security Verify Directory vuln allows remote authenticated attackers to execute arbitrary commands via crafted requests.
0
0
0
CVE-2024-51450 IBM Security Verify Directory 10.0.0 through 10.0.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially cra… https://t.co/eN3vp2R5YA
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://www.ibm.com/support/pages/node/7182558

CWE Details

CWE IDCWE NameDescription
CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence