Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38368: CWE-863 Incorrect Authorization in IBM Security Access Manager Docker

0
Medium
VulnerabilityCVE-2023-38368cvecve-2023-38368cwe-863
Published: Thu Jun 27 2024 (06/27/2024, 18:25:39 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Access Manager Docker

Description

IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could disclose sensitive information to a local user to do improper permission controls. IBM X-Force ID: 261195.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:53:08 UTC

Technical Analysis

CVE-2023-38368 is an authorization vulnerability classified under CWE-863 found in IBM Security Access Manager Docker versions 10.0.0.0 through 10.0.7.1. The flaw arises from improper permission controls within the product, allowing a local user with limited privileges (PR:L) to access sensitive information that should be restricted. The vulnerability does not require user interaction (UI:N) and affects confidentiality (C:H) but does not impact integrity or availability. The attack vector is local (AV:L), meaning an attacker must have some level of access to the host system running the Docker container. The CVSS v3.1 base score is 5.5, reflecting medium severity due to the moderate impact on confidentiality and the requirement for local access with low privileges. IBM Security Access Manager Docker is a security product used to manage access and authentication in enterprise environments, often deployed in containerized infrastructures. Improper authorization in such a product can lead to sensitive data leakage, potentially exposing credentials, configuration details, or session information that could be leveraged for further attacks. No patches or exploits are currently publicly available, but organizations should monitor IBM advisories for updates. The vulnerability highlights the importance of strict permission enforcement in security-critical containerized applications.

Potential Impact

For European organizations, the impact of CVE-2023-38368 can be significant in environments where IBM Security Access Manager Docker is deployed, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. Unauthorized local disclosure of sensitive information could lead to exposure of authentication tokens, configuration secrets, or user data, increasing the risk of lateral movement or privilege escalation within the network. This could undermine compliance with GDPR and other data protection regulations by exposing personal or confidential data. The requirement for local access limits the attack surface but insider threats or compromised internal systems could exploit this vulnerability. Additionally, organizations using containerized security solutions must be vigilant as this vulnerability demonstrates risks in container permission management. The medium severity suggests a moderate risk that should be addressed promptly to avoid escalation.

Mitigation Recommendations

1. Apply patches or updates from IBM as soon as they become available to address the improper authorization controls. 2. Restrict local access to hosts running IBM Security Access Manager Docker containers to trusted administrators only, minimizing the risk of local exploitation. 3. Implement strict container runtime security policies, including the use of Linux security modules (e.g., SELinux, AppArmor) to enforce least privilege and limit container access. 4. Conduct regular audits of permission settings and access controls within the container environment to detect and remediate misconfigurations. 5. Monitor logs and system activity for unusual local access attempts or privilege escalations related to the affected product. 6. Consider network segmentation to isolate critical container hosts from less trusted internal networks to reduce insider threat risks. 7. Educate system administrators and DevOps teams about the risks of improper authorization in containerized security products and best practices for secure deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2023-07-16T00:53:28.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092632fe7723195e0b5f8c

Added to database: 11/3/2025, 10:01:22 PM

Last enriched: 11/3/2025, 11:53:08 PM

Last updated: 11/5/2025, 1:49:23 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats