First published: Wed Feb 07 2024(Updated: )
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
Credit: psirt@us.ibm.com hyp3rlinx
Affected Software | Affected Version | How to fix |
---|---|---|
IBM i Access | >=1.1.2<=1.1.4 | |
IBM i Access | >=1.1.4.3<=1.1.9.4 | |
IBM i Access | <=1.1.2 - 1.1.4,1.1.4.3 - 1.1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22318 is classified as a high severity vulnerability due to the risk of NTLM hash disclosure.
To fix CVE-2024-22318, ensure that NTLM is disabled or implement stricter access controls and configurations.
CVE-2024-22318 affects IBM i Access Client Solutions versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4.
CVE-2024-22318 allows attackers to potentially disclose NTLM hashes, which can lead to credential theft.
A temporary workaround for CVE-2024-22318 is to disable NTLM authentication in the affected environments.