CVE-2024-31903
Published: 22 January 2025
Summary
CVE-2024-31903 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Ibm Sterling B2B Integrator. Its CVSS base score is 8.8 (High).
Operationally, ranked in the top 4.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly mitigates CVE-2024-31903 by applying vendor patches to fix the deserialization of untrusted data vulnerability.
Information input validation checks and sanitizes untrusted data before deserialization, preventing arbitrary code execution from malicious serialized inputs.
Boundary protection limits adjacent network access to the vulnerable IBM Sterling B2B Integrator system, blocking the attacker's prerequisite network proximity.
NVD Description
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data.
Deeper analysisAI
CVE-2024-31903 is a high-severity vulnerability (CVSS 8.8) in IBM Sterling B2B Integrator Standard Edition, affecting versions 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2. It stems from CWE-502, the deserialization of untrusted data, which enables an attacker on the local network to execute arbitrary code on the system.
An unauthenticated attacker with adjacent network access (AV:A) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N), requiring no privileges (PR:N) and maintaining unchanged scope (S:U). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing full arbitrary code execution on the targeted system.
IBM has published details and mitigation guidance in its security bulletin at https://www.ibm.com/support/pages/node/7172233, published on 2025-01-22. Security practitioners should consult this advisory for patching instructions and workarounds applicable to the affected versions.
Details
- CWE(s)