CVE-2024-22318
09.02.2024, 01:15
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | i_access_client_solutions | 1.1.2 ≤ 𝑥 ≤ 1.1.4 |
ibm | i_access_client_solutions | 1.1.4.3 ≤ 𝑥 ≤ 1.1.9.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-327 - Use of a Broken or Risky Cryptographic AlgorithmThe use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
- CWE-384 - Session FixationAuthenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
References