• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Guru: IBM i Unauthenticated Access

    April 25, 2022 Bruce Bading

    One of the greatest threats to any network, host, or server is unauthenticated access where an attacker can gain local or remote access with no credentials that can lead to a Critical rating with the following descriptions (CVSS v3.1 User Guide (first.org).

    Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)

    Integrity Impact Complete (There is a total compromise of system integrity, and a complete loss of system protection resulting in the entire system being compromised.)

    Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)

    Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist.

    Authentication is not required to exploit the vulnerability.

    The above descriptions of Confidentiality, Integrity and Availability (CIA) Impact Metrics are from the CVSS 3.1 Calculator (first.org). CVE 2022-23307 impacting log4j version 1.2 will list these CIA impacts.

    On the IBM i, there are other more serious protocols and services that can lead to unauthenticated access with the same Impact Metrics that are often overlooked and exist on the majority (> 50%) of all systems we assess.

    The worst unauthenticated access vulnerability on most IBM i systems exists when DDM/DRDA set to *USRID, *NO, or *VLDONLY. Any of these three values will allow unauthenticated access to your IBM i with a low complexity and authentication not required that can result in a complete compromise of system Confidentiality, Integrity, and Availability. You can check the current setting with the following command:

    CHGDDMTCPA and prompt with F4. 
    Autostart server . . . . . . . . >		*YES                      
    Lowest authentication method . . >		*USRID   
    Lowest encryption algorithm  . . >		*DES          
    

    The above presents 2 vulnerabilities, unauthenticated access, CVSS rating 10, and a weak encryption algorithm *DES, CVSS rating 7.5.

    DDM/DRDA is open architectures (Inside IBM’s Distributed Data Management architecture | IBM Journals & Magazine | IEEE Xplore). DB2 Connect is one example developed by IBM, but being open architectures, anyone can develop a client for any OS. The following connection string used by DB2 Connect is an example of unauthenticated access.

    DB2 connect to my400db USER QSECOFR USING ‘   ‘. 
    

    USING followed by ‘  ‘ signifies NO PASSWORD, and will connect QSECOFR or any “USER” with no credentials (unauthenticated access). Even using exit programs won’t protect you from this low complexity attack because several powerful profiles such as your HA profiles are usually allowed through the exits unauthenticated resulting in a complete loss of Confidentiality, Integrity, and Availability.

    Another unauthenticated attack vector exists if your QAPPNRMT configuration list specifies a SECLOC value = *NO for any remote connections. Text from this value’s help states that “The local system is not a secure location.” The exposures are default profiles in your communications subsystems and their authorities and privileges. Several times we find that QUSER has been changed to have *ALLOBJ special authority and is a default profile in QSYSWRK, the subsystem generally used by SNA communications. Other communication subsystems can be configured and can likewise contain powerful default profiles. Best practice is to delete the QAPPNRMT configuration list or set the SECLOC values to *YES or *VFYENCPWD.

    A third unauthenticated attack vector we generally detect is Network Attribute *JOBACN set to *FILE or *SEARCH. While not as bad as *SEARCH, *FILE can send a remote job to a corresponding profile on a remote system where possible malicious code can run depending upon the receiving user’s privileges. More dangerous is *SEARCH, which will search through the Network Job Table, and depending upon entries in your Network Job Table, powerful special authorities may be available. Regardless, *JOBACN provides unauthenticated access to your system and it is a best practice to set *JOBACN to *REJECT.

    Anonymous NFS exports are another critical risk we often find. Network vulnerability scanners detect and report these vulnerabilities as a High Risk Vulnerability (Exploiting NFS share [updated 2021] – Infosec Resources (infosecinstitute.com). The IBM i can export (share) numerous file systems including the Root (/), QOpenSys, User Defined File Systems (UDFS), QSYS.LIB, QDLS, and QOPT (optical) systems. Unauthenticated access can pose a risk if you don’t explicitly specify ANON=-1 on your EXPORTFS options. Specifying the UID of a powerful profile on the ANON keyword can create a Critical risk. If you don’t specify the ANON=uid keyword, all unknown requests will be processed under the default AS/400 NFS user profile, QNFSANON which is still anonymous and unauthenticated, and could present a critical risk if your admins have done something crazy like giving QNFSANON powerful special authorities, or access to confidential information. To view your exports, sign onto your system with *IOSYSCFG and CALL QZNFRTVE. Ensure you are viewing detailed messages and press F1 on any of the exports to display options.

    Configuring NetServer with a Guest Profile can present another unauthenticated vulnerability if you have any confidential data on your system and you are not implementing proper access controls.

    So before you think Log4j is your biggest unauthenticated access vulnerability, a vulnerability scan can detect these and many more risks. All compliance frameworks require unique accounts and role-based access. So while your IBM i may be one of the most securable systems, it is not secure if you don’t practice good security hygiene and scan often for vulnerabilities and fix them. Lastly, if you think the IBM i can’t be hacked, this busted myth led to several breaches while I served as Senior Cybersecurity Consultant for Rochester Lab Services and a couple since forming BFB Security, an IBM Business Partner specializing in IBM i Cybersecurity. If your systems are not secure, the time to remediate is now. If your systems have been breached, the time to remediate was yesterday.

    Bruce Bading is a senior security consultant with more than forty years of information security experience and 25 years of corporate c-suite experience. He is an expert on IBM i security and has helped some of IBM’s largest clients meet their security and compliance requirements in today’s complex technology and business environments. Bruce has exceptional communications skills, has worked with diverse audiences at all business levels to provide training and education and has led dozens of large enterprise risk management projects for the world’s largest organizations. He is a member of the Information Systems Audit and Control Association, a CIS benchmark author, and professional threat hunter.

    Editor’s Note: Bruce is one of a number of new Guru experts that we are working with to keep the Guru column going within The Four Hundred. We look forward to the coming in-depth security coverage that Bruce can give as you work to secure your IBM i platforms in these interesting times.

    RELATED STORIES

    Guru: SIEM Is Only Part Of IBM i Cybersecurity

    Guru: Would You Rather See a Fire Marshal or a Fire Fighter?

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: 400guru, cybersecurity, DB2 Connect, FHG, Four Hundred Guru, IBM i, Log4j, NetServer

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    The Power Systems And System z Mainframe Cycles Start Anew Why Modernize Your Legacy Monitoring?

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 28

This Issue Sponsored By

  • Fresche Solutions
  • Maxava
  • LaserVault
  • ARCAD Software
  • WorksRight Software

Table of Contents

  • Beware The Hype Of Modern Tech
  • Why Modernize Your Legacy Monitoring?
  • Guru: IBM i Unauthenticated Access
  • The Power Systems And System z Mainframe Cycles Start Anew
  • There Were Actually More Power Systems Price Hikes Than We Thought

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle