Cyber Posture

CVE-2024-39752

Medium

Published: 10 July 2025

Published
10 July 2025
Modified
23 July 2025
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-39752 is a medium-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Ibm Analytics Content Hub. Its CVSS base score is 6.8 (Medium).

Operationally, ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-434

Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.

addresses: CWE-434

Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.

addresses: CWE-434

Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.

addresses: CWE-434

Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.

NVD Description

IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could be vulnerable to malicious file upload by not validating the type of file uploaded to Explore Content. Attackers can make use of this weakness and upload malicious executable files into…

more

the system, and it can be sent to victim for performing further attacks.

Deeper analysisAI

IBM Analytics Content Hub versions 2.0, 2.1, 2.2, and 2.3 are affected by CVE-2024-39752, a vulnerability stemming from inadequate validation of file types uploaded via the Explore Content feature. This unrestricted upload of files with dangerous types (CWE-434) enables attackers to introduce malicious executable files into the system. The issue has a CVSS v3.1 base score of 6.8 (AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H), rated as medium severity.

Exploitation requires high privileges (PR:H), such as those held by authenticated administrators or privileged users, along with network access and low attack complexity. User interaction is necessary, typically involving a victim opening or executing the uploaded malicious file. Successful exploitation allows attackers to upload executables that can be distributed to other users, enabling further attacks like remote code execution with high impacts on confidentiality, integrity, and availability.

IBM has published a security advisory at https://www.ibm.com/support/pages/node/7234122 detailing the vulnerability, affected versions, and recommended mitigations or patches. Security practitioners should consult this resource for specific remediation steps.

Details

CWE(s)

Affected Products

ibm
analytics content hub
2.0 — 2.4

CVEs Like This One

CVE-2024-38327Same product: Ibm Analytics Content Hub
CVE-2024-39750Same product: Ibm Analytics Content Hub
CVE-2024-25034Same vendor: Ibm
CVE-2025-13689Same vendor: Ibm
CVE-2024-40693Same vendor: Ibm
CVE-2025-33015Same vendor: Ibm
CVE-2024-49352Same vendor: Ibm
CVE-2025-36070Same vendor: Ibm
CVE-2023-49886Same vendor: Ibm
CVE-2026-0977Same vendor: Ibm

References