Cyber Posture

CVE-2024-49354

Medium

Published: 18 January 2025

Published
18 January 2025
Modified
08 August 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0011 29.3th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49354 is a medium-severity Exposure of Sensitive Information Due to Incompatible Policies (CWE-213) vulnerability in Ibm Concert. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for access to information, directly preventing unauthorized disclosure of sensitive data via unauthenticated API calls.

prevent

AC-14 identifies and explicitly authorizes specific actions without identification or authentication, mitigating exploitation through specially crafted unauthenticated API requests.

prevent

SI-15 filters information prior to output from API responses, preventing the leakage of sensitive data in responses to crafted requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated exploitation of public-facing app API for info disclosure matches T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Concert 1.0.0, 1.0.1, and 1.0.2 is vulnerable to sensitive information disclosure through specially crafted API Calls.

Deeper analysisAI

CVE-2024-49354 is a sensitive information disclosure vulnerability affecting IBM Concert versions 1.0.0, 1.0.1, and 1.0.2. The flaw allows unauthorized access to sensitive data through specially crafted API calls and is classified under CWE-213. It carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity with network accessibility, low attack complexity, no privileges or user interaction required, unchanged scope, low confidentiality impact, and no integrity or availability impact.

Remote attackers can exploit this vulnerability over the network without authentication by sending maliciously crafted API requests to affected IBM Concert instances. Successful exploitation results in the disclosure of sensitive information, potentially aiding further attacks, though the impact is limited to low confidentiality loss.

IBM has published a security advisory with details on the vulnerability at https://www.ibm.com/support/pages/node/7174120. Security practitioners should consult this bulletin for guidance on available patches and mitigation steps.

Details

CWE(s)

Affected Products

ibm
concert
1.0.0, 1.0.1, 1.0.2

CVEs Like This One

CVE-2025-1719Same product: Ibm Concert
CVE-2025-64647Same product: Ibm Concert
CVE-2025-1722Same product: Ibm Concert
CVE-2025-33089Same product: Ibm Concert
CVE-2025-33015Same product: Ibm Concert
CVE-2024-52367Same product: Ibm Concert
CVE-2024-49352Same vendor: Ibm
CVE-2025-3320Same vendor: Ibm
CVE-2025-3354Same vendor: Ibm
CVE-2023-49886Same vendor: Ibm

References