Computer security

Four new zero day vulnerabilities reported in IBM’s security software

Security researcher ‘Pedro Ribeiro’ has disclosed a PoC for four zero-day vulnerabilities in IBM’s enterprise security software. The researcher has reported the same with IBM, but since they had refused to accept the disclosure, the zero-day vulnerabilities were made public.

The enterprise security software from IBM is Data Risk Manager, which is used for managing sensitive business information assets and detect the risks related to it. Pedro had identified four critical vulnerabilities, and a high impact bug, that can be exploited by hackers. The four vulnerabilities are authentication bypass, command injection, insecure default password, and arbitrary file download. The vulnerabilities were identified in the version 2.0.1 to 2.0.3, which is however not the latest version of the IBM’s software. Albeit, Pedro tested them in the previous version, the new versions are no exception as the vulnerabilities are not fixed until this article was published.

Considering IBM’s security software has the vulnerabilities, this could facilitate hackers with other business vulnerabilities, as the Data Risk Manager takes care of full-scale compromises of the business sensitive information. Authentication bypass allows hackers to reset the password of the accounts, including the administrator account. Hackers can execute malicious commands if the Nmap scripts can be exploited by them using the command injection flaw. Also, the vulnerability disclosure of shell and sudo commands has a default password which could be breached by the hackers if left unchanged. The next vulnerability in the endpoints API allows users to access the log files, and if breached by the attackers then not just log files but any files can be downloaded. Furthermore, the researcher has also disclosed two other issues, remote code execution and arbitrary file download.

IBM Bug Bounty programs does not provide bounties

Source: Pedro Ribeiro PoC post in GitHub

The above image was posted by Pedro in Github in a way of showing his disappointment with IBM.

Bug Bounty programs are a way to use external penetration testers and researchers analyze the security issues in your software and offer them some bounty based on the criticality of the flaws that they have identified and reported. Also, this way vendors can ensure the vulnerabilities are identified and fixed before hackers take advantage of them in the wild. However, when Pedro reported these three zero day vulnerabilities to IBM via CERT/CC, the company had refused to accept the vulnerability report and had mentioned the product is only for ‘enhanced’ tech support paid by their clients. 

However, Pedro had mentioned that he has disclosed the vulnerabilities for the security reasons and did not expect a bounty as he doesn’t own a HackerOne account. IBM is yet to confirm the vulnerabilities, and release a security advisory regarding the same.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago