Cyber Posture

CVE-2024-49782

Medium

Published: 20 February 2025

Published
20 February 2025
Modified
11 March 2025
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0021 42.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49782 is a medium-severity Improper Validation of Certificate with Host Mismatch (CWE-297) vulnerability in Ibm Openpages With Watson. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 42.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-17 (Public Key Infrastructure Certificates) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates proper validation of PKI certificates during SSL/TLS connections, directly preventing mail server identity spoofing due to improper certificate validation.

prevent

Requires timely identification, reporting, and remediation of flaws like improper certificate validation through patching, as provided by IBM for this CVE.

prevent

Enforces cryptographic protection for transmission confidentiality and integrity using TLS, addressing spoofing risks in email notifications though not fully covering certificate validation specifics.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Improper certificate validation enables adversary-in-the-middle attacks against TLS connections to the mail server, allowing spoofing and interception of email notifications.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM OpenPages with Watson 8.3 and 9.0 could allow a remote attacker to spoof mail server identity when using SSL/TLS security. An attacker could exploit this vulnerability to gain access to sensitive information disclosed through email notifications generated by OpenPages…

more

or disrupt notification delivery.

Deeper analysisAI

CVE-2024-49782 affects IBM OpenPages with Watson versions 8.3 and 9.0, where the software could allow a remote attacker to spoof the mail server identity when using SSL/TLS security. This vulnerability stems from improper certificate validation, mapped to CWE-297 (Improper Validation of Certificate with Host Mismatch) and CWE-295 (Improper Certificate Validation). It has a CVSS v3.1 base score of 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H), indicating medium severity with network accessibility, high attack complexity, low privileges required, high confidentiality impact, and high availability impact.

A remote attacker with low privileges could exploit this vulnerability to spoof the mail server identity during SSL/TLS connections used for email notifications generated by OpenPages. Successful exploitation would enable the attacker to access sensitive information disclosed through these notifications or disrupt their delivery entirely.

The IBM security advisory at https://www.ibm.com/support/pages/node/7183541 provides details on mitigation, including available patches for the affected versions.

Details

CWE(s)

Affected Products

ibm
openpages with watson
8.3 — 8.3.0.3 · 9.0 — 9.0.0.5

CVEs Like This One

CVE-2024-49779Same product: Ibm Openpages With Watson
CVE-2024-49781Same product: Ibm Openpages With Watson
CVE-2026-35560Same product: Linux Linux Kernel
CVE-2026-30794Same product: Linux Linux Kernel
CVE-2025-13916Same product: Linux Linux Kernel
CVE-2024-41766Same product: Linux Linux Kernel
CVE-2024-54171Same product: Linux Linux Kernel
CVE-2024-41767Same product: Linux Linux Kernel
CVE-2024-41763Same product: Linux Linux Kernel
CVE-2025-36258Same product: Linux Linux Kernel

References