IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Feb/7 | Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/279091 | VDB Entry |
https://www.ibm.com/support/pages/node/7116091 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-09 01:15
Updated : 2024-04-03 02:15
NVD link : CVE-2024-22318
Mitre link : CVE-2024-22318
CVE.ORG link : CVE-2024-22318
JSON object : View
Products Affected
ibm
- i_access_client_solutions
CWE
CWE-384
Session Fixation