CVE-2024-22318
low-risk
Published 2024-02-09
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
Do I need to act?
-
0.17% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.1/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
I Access Client Solutions
Affected Vendors
References (8)
Third Party Advisory
http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote...
Mailing List
http://seclists.org/fulldisclosure/2024/Feb/7
Vendor Advisory
https://www.ibm.com/support/pages/node/7116091
Third Party Advisory
http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote...
Mailing List
http://seclists.org/fulldisclosure/2024/Feb/7
Vendor Advisory
https://www.ibm.com/support/pages/node/7116091
19
/ 100
low-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal