A SSRF flaw in IBM Maximo Asset Management could be used to target corporate networksSecurity Affairs

IBM recently fixed a high-severity issue in its Maximo asset management solution that could facilitate attacks on corporate networks.

IBM recently addressed a high-severity issue, tracked as CVE-2020-4529, in its Maximo asset management solution that could facilitate attacks on making lateral movements within corporate networks.

Maximo is designed to assist an organisation in managing its assets

The vulnerability is a server side request forgery (SSRF) issue that has been reported to IBM by Andrey Medov and Arseniy Sharoglazov of Positive Technologies.

The CVE-2020-4529 could allow an authenticated attacker to send unauthorized requests from a system, potentially leading to other attacks, such as network enumeration,

“IBM Maximo Asset Management is vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.” reads the security advisory.

The vulnerability impacts Maximo Asset Management 7.6.0 and 7.6.1., the IT giant already released an update to address the issue along with workarounds and mitigations.

The flaw also affects solutions developed for specific industries, including Aviation, Life Sciences, Oil and Gas, Nuclear Power, Transportation, and for Utilities.

Researchers who discovered the issue explained that an attack can be launched from a warehouse worker’s workstation, which may easy tohack for a threat actor.

“IBM Maximo Asset Management software is used at major critical facilities. Any vulnerabilities in it could attract APT groups interested in access to the internal network. One example of a low-privileged attacker is a warehouse worker, who remotely connects to the system and enters items into a database. A threat could also come from the warehouse worker’s workstation itself, if infected by a virus.Arseny Sharoglazov explained.

“IBM Maximo web interfaces are usually accessible from all of a company’s warehouses, which could be located in multiple regions or countries. So if our ‘warehouse worker’ or equivalent connects through a properly configured VPN, that person’s access within the corporate network is restricted to what they need— from that particular system and email, for example. But the vulnerability we found allows bypassing this restriction and interacting with other systems, on which an attacker could try for remote code execution (RCE) and potentially access all systems, blueprints, documents, accounting information, and ICS process networks. Sometimes employees connect to IBM Maximo directly over the Internet with weak passwords and no VPN, making an attack easier to perform.”

Pierluigi Paganini

(SecurityAffairs – hacking, Maximo)

Source link

Recent articles

Tubites · Packaging

Creating a playful, fresh, and colorful packaging for the new guilt-free snacks brand "Tubites". Each of the product lines is aimed at...

BlendNet free addon to simplify the cloud rendering

Rabit writes: The new BlendNet v0.2 was released and could be quite useful for everyone who wants to save money on the render farm...

What’s New on Netflix UK: July 8th, 2020

Stateless is now available to stream on Netflix UKA quiet Wednesday on Netflix UK with three 3 additions to the library. Of the...

Save time at the command line with HTTPie instead of curl

Ah, curl. While widely-loved and wildly powerful, its ergonomics leave something to be desired. Although it should not replace curl in your automation,...

Creditor payment scheme allows Blue Air to rebuild network | News

Romanian budget airline Blue Air has entered a financial restructuring process to protect the company from creditors and enable it to restart routes. Blue...

1990 FIFA World Cup™ – News – A magical night in Rome

​Matthaus and Voller were West Germany's first-choice penalty-takers Brehme found himself under a 700-something-kilogram pile-up! An emperor reigned in Rome for...

Leave a reply

Please enter your comment!
Please enter your name here