CVE-2024-51459
Published: 19 March 2025
Summary
CVE-2024-51459 is a high-severity Improper Handling of Insufficient Permissions or Privileges (CWE-280) vulnerability in Ibm Infosphere Information Server. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Employs least privilege to restrict local unprivileged users from executing privileged commands despite improper permission handling.
Enforces approved authorizations and permissions to directly mitigate improper handling allowing local privilege escalation.
Requires identification, reporting, and patching of flaws like this improper permission vulnerability to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local privilege escalation via improper permissions handling (CWE-280) enabling execution of privileged commands with no initial privileges.
NVD Description
IBM InfoSphere Information Server 11.7 could allow a local user to execute privileged commands due to the improper handling of permissions.
Deeper analysisAI
IBM InfoSphere Information Server 11.7 is affected by CVE-2024-51459, a vulnerability stemming from improper handling of permissions (CWE-280). This flaw enables a local user to execute privileged commands. The issue carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
A local attacker requires only local access to the system, with no privileges (PR:N), low attack complexity, and no user interaction needed. Successful exploitation allows the execution of privileged commands, granting high-level control over the affected system and potentially leading to full compromise.
IBM has issued an advisory at https://www.ibm.com/support/pages/node/7185056, which provides details on the vulnerability and recommended mitigation steps, including applying available patches.
Details
- CWE(s)