Cyber Posture

CVE-2024-41770

High

Published: 03 March 2025

Published
03 March 2025
Modified
07 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0013 31.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-41770 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Ibm Engineering Requirements Management Doors Next. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely identification, reporting, and correction of the flaw allowing remote attackers to download temporary files exposing sensitive information.

prevent

Enforces approved authorizations to logically access system resources, preventing unauthorized remote download of temporary files containing application logic or sensitive data.

prevent

Mandates secure configuration settings that restrict exposure of temporary files and directories to remote unauthenticated attackers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vulnerability in public-facing web app allows unauthenticated remote download of temp files exposing sensitive data/credentials (CWE-522), directly enabling T1190 for initial access and T1552.001 for obtaining unsecured credentials from files.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.

Deeper analysisAI

IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1 are affected by CVE-2024-41770, a vulnerability that could allow a remote attacker to download temporary files, potentially exposing application logic or other sensitive information. This issue is classified under CWE-522 (Insufficiently Protected Credentials) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for authentication, privileges, or user interaction.

The vulnerability can be exploited by any remote attacker with network access to the affected DOORS Next instance. Successful exploitation enables the download of temporary files, which may reveal sensitive data such as application logic, without impacting integrity or availability.

IBM has published a security bulletin at https://www.ibm.com/support/pages/node/7184663 detailing the vulnerability, affected versions, and recommended patches or mitigations for remediation.

Details

CWE(s)

Affected Products

ibm
engineering requirements management doors next
7.0.2, 7.0.3, 7.1

CVEs Like This One

CVE-2024-41771Same product: Ibm Engineering Requirements Management Doors Next
CVE-2024-43169Same product: Ibm Engineering Requirements Management Doors Next
CVE-2024-49352Same vendor: Ibm
CVE-2025-3320Same vendor: Ibm
CVE-2025-3354Same vendor: Ibm
CVE-2023-49886Same vendor: Ibm
CVE-2025-0160Same vendor: Ibm
CVE-2026-4101Same vendor: Ibm
CVE-2026-1343Same vendor: Ibm
CVE-2025-36386Same vendor: Ibm

References