Cyber Posture

CVE-2024-22347

Medium

Published: 20 January 2025

Published
20 January 2025
Modified
14 August 2025
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 6.7th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-22347 is a medium-severity Use of a Broken or Risky Cryptographic Algorithm (CWE-327) vulnerability in Ibm Devops Velocity. Its CVSS base score is 5.9 (Medium).

Operationally, ranked at the 6.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires NIST-approved cryptographic mechanisms to protect sensitive information from decryption using weak algorithms as in this CVE.

prevent

Mandates timely flaw remediation, including patching the affected IBM software versions to address the weak cryptographic algorithms.

prevent

Requires cryptographic protection of information at rest, mitigating decryption of sensitive data stored by the vulnerable software.

NVD Description

IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.

Deeper analysisAI

CVE-2024-22347 is a cryptographic weakness (CWE-327) in IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity versions 4.0.0 through 4.0.25, where weaker than expected cryptographic algorithms are used. This flaw could enable an attacker to decrypt highly sensitive information. The vulnerability carries a CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating medium severity with high confidentiality impact but no integrity or availability effects.

A remote attacker with network access could potentially exploit this vulnerability without privileges or user interaction, though it requires high attack complexity. Successful exploitation would allow decryption of highly sensitive data stored or transmitted by the affected software, compromising confidentiality.

IBM has published a security bulletin at https://www.ibm.com/support/pages/node/7172750 providing details on the issue and recommended mitigation steps.

Details

CWE(s)

Affected Products

ibm
devops velocity
5.0.0
ibm
urbancode velocity
4.0.0 — 4.0.15

CVEs Like This One

CVE-2024-22348Same product: Ibm Devops Velocity
CVE-2025-14480Same vendor: Ibm
CVE-2024-27256Same vendor: Ibm
CVE-2024-31896Same vendor: Ibm
CVE-2024-43178Same vendor: Ibm
CVE-2024-45643Same vendor: Ibm
CVE-2024-56340Same vendor: Ibm
CVE-2024-43187Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm
CVE-2024-28766Same vendor: Ibm

References