CVE-2024-39752
Published: 10 July 2025
Summary
CVE-2024-39752 is a medium-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Ibm Analytics Content Hub. Its CVSS base score is 6.8 (Medium).
Operationally, ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
NVD Description
IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could be vulnerable to malicious file upload by not validating the type of file uploaded to Explore Content. Attackers can make use of this weakness and upload malicious executable files into…
more
the system, and it can be sent to victim for performing further attacks.
Deeper analysisAI
IBM Analytics Content Hub versions 2.0, 2.1, 2.2, and 2.3 are affected by CVE-2024-39752, a vulnerability stemming from inadequate validation of file types uploaded via the Explore Content feature. This unrestricted upload of files with dangerous types (CWE-434) enables attackers to introduce malicious executable files into the system. The issue has a CVSS v3.1 base score of 6.8 (AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H), rated as medium severity.
Exploitation requires high privileges (PR:H), such as those held by authenticated administrators or privileged users, along with network access and low attack complexity. User interaction is necessary, typically involving a victim opening or executing the uploaded malicious file. Successful exploitation allows attackers to upload executables that can be distributed to other users, enabling further attacks like remote code execution with high impacts on confidentiality, integrity, and availability.
IBM has published a security advisory at https://www.ibm.com/support/pages/node/7234122 detailing the vulnerability, affected versions, and recommended mitigations or patches. Security practitioners should consult this resource for specific remediation steps.
Details
- CWE(s)