CVE-2024-41771
Published: 03 March 2025
Description
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Security Summary
CVE-2024-41771 is a vulnerability in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1 that allows a remote attacker to download temporary files, potentially exposing application logic or other sensitive information. The issue is classified under CWE-522 (Insufficiently Protected Credentials) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility, low attack complexity, and no requirements for privileges or user interaction.
A remote, unauthenticated attacker can exploit this vulnerability over the network with minimal effort to access and download temporary files from the affected DOORS Next instances. Successful exploitation enables the disclosure of sensitive data, such as application logic or other confidential information contained in those files, without impacting integrity or availability.
IBM has published a security advisory detailing the vulnerability and mitigation steps at https://www.ibm.com/support/pages/node/7184663. Security practitioners should review this bulletin for patch availability and apply updates to affected versions promptly to prevent unauthorized access to temporary files.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Vulnerability in public-facing web application (DOORS Next) allows remote unauthenticated download of sensitive temporary files, directly enabling exploitation of public-facing apps (T1190) and facilitating access to data from local system files (T1005).