Cyber Posture

CVE-2024-43187

Medium

Published: 04 February 2025

Published
04 February 2025
Modified
15 December 2025
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 10.5th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-43187 is a medium-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Ibm Security Verify Access. Its CVSS base score is 5.9 (Medium).

Operationally, ranked at the 10.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-8 (Transmission Confidentiality and Integrity) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-8 mandates cryptographic protection for the confidentiality and integrity of transmitted information, directly preventing sniffing of sensitive data in cleartext as in this CVE.

prevent

SI-2 requires identification, reporting, and correction of flaws like CVE-2024-43187, enabling patching to eliminate cleartext transmission per IBM's advisory.

prevent

SC-13 enforces cryptographic standards and modules that support secure transmission protections, mitigating cleartext vulnerabilities when applied to communications.

NVD Description

IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Deeper analysisAI

CVE-2024-43187 is a vulnerability in IBM Security Verify Access Appliance and Container versions 10.0.0 through 10.0.8 that results in the transmission of sensitive or security-critical data in cleartext over a communication channel susceptible to sniffing by unauthorized actors. This issue is classified under CWE-319 (Cleartext Transmission of Sensitive Information) and carries a CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating medium severity primarily due to high confidentiality impact.

The vulnerability can be exploited by unauthorized actors with network access who lack privileges and require no user interaction, though exploitation demands high attack complexity, such as positioning to intercept traffic. Successful attacks enable sniffing and capture of sensitive data in transit, compromising confidentiality without affecting integrity or availability.

IBM's security advisory at https://www.ibm.com/support/pages/node/7182386 provides details on remediation and mitigation steps for this vulnerability.

Details

CWE(s)

Affected Products

ibm
security verify access
10.0.0.0 — 10.0.9.0
ibm
security verify access docker
10.0.0.0 — 10.0.9.0

CVEs Like This One

CVE-2024-45647Same product: Ibm Security Verify Access
CVE-2025-0161Same product: Ibm Security Verify Access
CVE-2024-49814Same product: Ibm Security Verify Access
CVE-2026-4101Same product: Ibm Security Verify Access
CVE-2026-1343Same product: Ibm Security Verify Access
CVE-2026-1345Same product: Ibm Security Verify Access
CVE-2026-1346Same product: Ibm Security Verify Access
CVE-2026-1342Same product: Ibm Security Verify Access
CVE-2025-13718Same vendor: Ibm
CVE-2024-56340Same vendor: Ibm

References