Command Injection Vulnerability in IBM Security Verify Directory
CVE-2024-51450

9.1CRITICAL

Key Information:

Vendor
IBM
Vendor
CVE Published:
6 February 2025

What is CVE-2024-51450?

CVE-2024-51450 is a command injection vulnerability identified in IBM Security Verify Directory versions 10.0.0 through 10.0.3. This software serves as a comprehensive identity and access management solution, facilitating secure identity verification and user access controls for organizations. If exploited, this vulnerability could allow remote authenticated attackers to execute arbitrary commands on the server, potentially compromising management of user identities and sensitive data. The implications for organizations utilizing this software could be severe, including unauthorized data access and operational disruption.

Technical Details

The vulnerability arises from improper handling of input in the IBM Security Verify Directory. Specifically, the flaw permits a malicious user, who has already gained authenticated access to the system, to craft a request that can execute arbitrary commands. This command injection flaw can be executed without the need for extensive privileges, making it particularly dangerous as it allows attackers to escalate their access on the system.

Potential Impact of CVE-2024-51450

  1. Unauthorized System Access: Attackers could execute arbitrary commands, which may lead to unauthorized access to sensitive data and internal systems, posing a direct threat to data integrity and confidentiality.

  2. Data Breaches: Exploiting this vulnerability could result in significant data breaches, leading to loss of sensitive information, compliance violations, and reputational damage for organizations.

  3. Operational Disruption: The ability to execute commands remotely may allow attackers to disrupt normal operations, potentially impacting business continuity and leading to costly recovery efforts.

Affected Version(s)

Security Verify Directory 10.0.0 <= 10.0.3

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.