Cyber Posture

CVE-2024-41771

High

Published: 03 March 2025

Published
03 March 2025
Modified
07 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0013 31.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-41771 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Ibm Engineering Requirements Management Doors Next. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-13 (Monitoring for Information Disclosure).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2024-41771 by requiring identification, reporting, and timely correction of the flaw allowing unauthorized download of temporary files containing sensitive information.

prevent

Enforces approved authorizations to logically prevent remote unauthenticated access and download of temporary files exposing application logic or sensitive data.

detect

Monitors the system specifically for unauthorized information disclosure events, such as remote downloads of temporary files containing sensitive information.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Vulnerability in public-facing web application (DOORS Next) allows remote unauthenticated download of sensitive temporary files, directly enabling exploitation of public-facing apps (T1190) and facilitating access to data from local system files (T1005).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.

Deeper analysisAI

CVE-2024-41771 is a vulnerability in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1 that allows a remote attacker to download temporary files, potentially exposing application logic or other sensitive information. The issue is classified under CWE-522 (Insufficiently Protected Credentials) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility, low attack complexity, and no requirements for privileges or user interaction.

A remote, unauthenticated attacker can exploit this vulnerability over the network with minimal effort to access and download temporary files from the affected DOORS Next instances. Successful exploitation enables the disclosure of sensitive data, such as application logic or other confidential information contained in those files, without impacting integrity or availability.

IBM has published a security advisory detailing the vulnerability and mitigation steps at https://www.ibm.com/support/pages/node/7184663. Security practitioners should review this bulletin for patch availability and apply updates to affected versions promptly to prevent unauthorized access to temporary files.

Details

CWE(s)

Affected Products

ibm
engineering requirements management doors next
7.0.2, 7.0.3, 7.1

CVEs Like This One

CVE-2024-41770Same product: Ibm Engineering Requirements Management Doors Next
CVE-2024-43169Same product: Ibm Engineering Requirements Management Doors Next
CVE-2024-56340Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm
CVE-2026-1567Same vendor: Ibm
CVE-2025-13096Same vendor: Ibm
CVE-2025-13616Same vendor: Ibm
CVE-2025-12531Same vendor: Ibm
CVE-2024-49352Same vendor: Ibm
CVE-2025-3320Same vendor: Ibm

References