• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • April Showers Bring May IBM i Security Vulnerabilities

    May 8, 2024 Alex Woodie

    IBM has patched more than a dozen security flaws in IBM i and related products this spring, including serious flaws in the operating system proper and the compilers, and a critical vulnerability in Administrative Runtime Expert that landed a nearly perfect CVSS Base score.

    In the interest of time, let’s cover the security vulnerabilities in descending order of severity. That means we’re starting with the worst and then moving on to the slightly less worse.

    ARE Flaw

    The flaw reported in the Administration Runtime Expert for i (ARE), which IBM launched in 2010 to make it easier to manage IBM i environment, is the most pressing concern for IBM i administrator. That’s because it could allow a cybercriminal to run arbitrary code on IBM i by remotely sending a specially crafted request to the vulnerable software, which is never a good thing.

    The ARE flaw is contained in a JavaScript library called Dojo that IBM uses to render the product’s GUI. For years, Dojo has been susceptible to a security vulnerability referred to as “prototype pollution” error in the setObject function. The security vulnerability, CVE-2021-2345, was first discovered in 2021, and was updated in on April 24 of this year, when IBM first reported it as impacting IBM i. It carries a CVSS Base score of 9.8, making it a critical flaw.

    The Dojo flaw impacts ARE in IBM i versions 7.2 through 7.5. There are no workarounds and users are encouraged to apply the emergency PTFs immediately. Read this security bulletin for more information and PTF numbers.

    IBM i and RDS Flaw

    IBM reported a privilege escalation flaw in IBM i and Rational Development Studio (RDS) for i on April 27, 2024. The vulnerability, which could allow user-controlled code to run with administrator privilege by submitting a malicious CL command, was traced to an unqualified library call contained in the IBM i networking and compiler infrastructure.

    The flaw, which was given the name CVE-2024-25050 in the Common Vulnerability and Exposure (CVE) database maintained by the National Institute of Science and Technology (NIST), has a CVSS Base score of 8.4, making it a serious threat. There are no workarounds and IBM encourages all customers running IBM i 7.2 through 7.5 to apply emergency PTFs to fix the problem. IBM made no acknowledgements as to who discovered the vuln.

    To remedy the flaw, customers will have to apply around 20 PTFs for each version of IBM i. You can find the specific PTF numbers needed for your version of IBM i by reading the security bulletin. IBM also issued a security bulletin for RDS, but it’s the same flaw with the same fix.

    Java Flaws

    In late March, IBM fixed half a dozen newly discovered security flaws in the Java Software Development Kit (SDK) and Java runtime for IBM i.

    Five of the flaws are due to “unspecified vulnerabilities” in various components of Java SE (Standard Edition) that could “cause high confidentiality impact and high integrity impact,” IBM says in its March 27 security bulletin.

    Two of these flaws, CVE-2024-20952 and CVE-2024-20918, can be executed by remote attackers and carry CVSS Base scores of 7.4, making them high security threats. Two others, CVE-2024-20921 and CVE-2024-20926, can also be carried out remotely and carry CVSS Base scores of 5.9, making them midrange threats. One of these flaws, CVE-2024-20945, can only be carried out by an authenticated attacker, and it was given a CVSS Base score of 4.7.

    The final Java flaw, CVE-2023-33850, refers to an issue in the GSKit-Crypto library that would allow a remote attacker to obtain sensitive information by sending an overly large number of trial messages for decryption to the RSA Decryption implementation. This flaw carries a CVSS Base score of 7.5, making it a high security threat.

    IBM fixed the Java flaws with PTFs for IBM i versions 7.3 through 7.5. For more info, see the March 27 security bulletin.

    ACS Flaws

    IBM issued a pair of security bulletins to bring attention to three vulnerabilities recently discovered and patched in Access Client Solutions (ACS), the widely used IBM utility for working with the server.

    The first security bulletin covers two flaws discovered in Apache Commons Compress, an open source data compression product that IBM uses in ACS’s Data Transfer feature when transferring data from Excel.

    The first Apache Commons Compress flaw, CVE-2024-25710, could enable a cybercriminal to launch a denial of service (DOS) attack by creating an infinite loop with a specially crafted DUMP file. The second flaw, CVE-2024-26308, also could allow a hacker to launch a DOS attack, this time by causing an out-of-memory error with a specialized crafted “Pack200” file.

    Both flaws carry CVSS Base Score of 5.5, making them mid-sized threats. The flaws existing in ACS versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4. The fix is to upgrade to ACS version 1.1.9.5, which IBM shipped last month.

    The second security bulletin for ACS, also issued April 19, alerts users to the existence of CVE-2023-48795, a security vulnerability in the product’s OpenSSH implementation of Apache Mina, which is used to help authenticate users in the Open Source Package Manager component.

    OpenSSH is vulnerable to a machine-in-the-middle attack caused by a flaw in the extension negotiation process in the SSH transport protocol when used with certain OpenSSH extensions, IBM says. It carries a CVSS Base score of 5.9, making it a midrange threat. The remediation, as before is to upgrade to ACS version 1.1.9.5.

    Quickly applying emergency PTFs when IBM delivers them is an important step in building a secure IBM i environment. You can subscribe to IBM’s My Notifications service to automatically receive alerts on IBM security fixes. You can also subscribe to IT Jungle and read Doug Bidwell’s PTF Guide to stay up to date. For a list of all recent security vulnerabilities in IBM i, click here.

    RELATED STORIES

    IBM Cranks Up the Performance for Run SQL Scripts

    More Critical Security Vulns Reported In IBM i Components

    IBM Patches New Security Vulns In IBM i Components, Power Firmware

    IBM i Security Concern Hits All-Time High, But Solution Adoption Lags, Fortra’s Marketplace Study Shows

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Access Client Solutions, ACS, Administration Runtime Expert for i, ARE, CVSS, IBM i, Java, JavaScript, OpenSSH, PTF, Rational Development Studio, RDS

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Power Systems Poised To Embiggen This Year? Four Hundred Monitor, May 8

    Leave a Reply Cancel reply

TFH Volume: 34 Issue: 24

This Issue Sponsored By

  • Maxava
  • Connectria
  • New Generation Software
  • WorksRight Software
  • Raz-Lee Security

Table of Contents

  • IBM Sharpens Its Edge With “Bonnell” Entry Power10 System
  • Lost Data – The Silent Killer
  • Spring 2024 IBM i Technology Refresh Unveiled by IBM
  • Four Hundred Monitor, May 8
  • April Showers Bring May IBM i Security Vulnerabilities

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle