CVE-2024-41770
Published: 03 March 2025
Summary
CVE-2024-41770 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Ibm Engineering Requirements Management Doors Next. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely identification, reporting, and correction of the flaw allowing remote attackers to download temporary files exposing sensitive information.
Enforces approved authorizations to logically access system resources, preventing unauthorized remote download of temporary files containing application logic or sensitive data.
Mandates secure configuration settings that restrict exposure of temporary files and directories to remote unauthenticated attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing web app allows unauthenticated remote download of temp files exposing sensitive data/credentials (CWE-522), directly enabling T1190 for initial access and T1552.001 for obtaining unsecured credentials from files.
NVD Description
IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.
Deeper analysisAI
IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1 are affected by CVE-2024-41770, a vulnerability that could allow a remote attacker to download temporary files, potentially exposing application logic or other sensitive information. This issue is classified under CWE-522 (Insufficiently Protected Credentials) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for authentication, privileges, or user interaction.
The vulnerability can be exploited by any remote attacker with network access to the affected DOORS Next instance. Successful exploitation enables the download of temporary files, which may reveal sensitive data such as application logic, without impacting integrity or availability.
IBM has published a security bulletin at https://www.ibm.com/support/pages/node/7184663 detailing the vulnerability, affected versions, and recommended patches or mitigations for remediation.
Details
- CWE(s)