CVE-2024-35122: CWE-266 Incorrect Privilege Assignment
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file.
AI Analysis
Technical Summary
CVE-2024-35122 is a vulnerability affecting IBM i operating system versions 7.2, 7.3, 7.4, and 7.5. The issue stems from an incorrect privilege assignment (CWE-266) related to the handling of referential constraints at the file level. Specifically, a local non-privileged user can exploit insufficient authority requirements to configure a referential constraint using the privileges of another user who has been socially engineered to access the target file. This results in a local denial of service (DoS) condition at the file level, where the attacker can disrupt access or operations on the file by leveraging elevated privileges indirectly. The vulnerability requires local access, low complexity in terms of attack conditions, and some user interaction (social engineering) to succeed. The CVSS v3.1 base score is 2.8, indicating a low severity primarily because the impact is limited to availability (denial of service) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights a privilege management flaw where the system does not adequately verify authority when setting referential constraints, allowing privilege escalation through social engineering and local access.
Potential Impact
For European organizations using IBM i systems in versions 7.2 through 7.5, this vulnerability could lead to localized denial of service conditions on critical files. While the impact on confidentiality and integrity is negligible, availability disruptions can affect business-critical applications relying on these files, potentially causing operational delays or downtime. Industries such as finance, manufacturing, and logistics that depend on IBM i for transaction processing and data management could face interruptions. The requirement for local access and social engineering reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments with many users or where insider threats exist. Organizations with less mature internal security awareness programs may be more vulnerable to the social engineering component. Given the low CVSS score, the threat is not urgent but should be addressed to maintain system reliability and prevent potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Implement strict access controls and monitoring on IBM i systems to limit local user privileges and detect unusual configuration changes related to referential constraints. 2. Enhance user awareness and training programs to reduce the risk of social engineering attacks that could enable privilege misuse. 3. Regularly audit file permissions and referential constraint configurations to identify and remediate improper privilege assignments. 4. Apply the latest IBM i security updates and patches as they become available, even though no patch link is currently provided, monitor IBM security advisories closely. 5. Employ multi-factor authentication and session monitoring for users with access to critical files to reduce the risk of unauthorized privilege use. 6. Consider implementing application-level controls or logging to detect and respond to abnormal file access patterns that may indicate exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2024-35122: CWE-266 Incorrect Privilege Assignment
Description
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file.
AI-Powered Analysis
Technical Analysis
CVE-2024-35122 is a vulnerability affecting IBM i operating system versions 7.2, 7.3, 7.4, and 7.5. The issue stems from an incorrect privilege assignment (CWE-266) related to the handling of referential constraints at the file level. Specifically, a local non-privileged user can exploit insufficient authority requirements to configure a referential constraint using the privileges of another user who has been socially engineered to access the target file. This results in a local denial of service (DoS) condition at the file level, where the attacker can disrupt access or operations on the file by leveraging elevated privileges indirectly. The vulnerability requires local access, low complexity in terms of attack conditions, and some user interaction (social engineering) to succeed. The CVSS v3.1 base score is 2.8, indicating a low severity primarily because the impact is limited to availability (denial of service) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights a privilege management flaw where the system does not adequately verify authority when setting referential constraints, allowing privilege escalation through social engineering and local access.
Potential Impact
For European organizations using IBM i systems in versions 7.2 through 7.5, this vulnerability could lead to localized denial of service conditions on critical files. While the impact on confidentiality and integrity is negligible, availability disruptions can affect business-critical applications relying on these files, potentially causing operational delays or downtime. Industries such as finance, manufacturing, and logistics that depend on IBM i for transaction processing and data management could face interruptions. The requirement for local access and social engineering reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments with many users or where insider threats exist. Organizations with less mature internal security awareness programs may be more vulnerable to the social engineering component. Given the low CVSS score, the threat is not urgent but should be addressed to maintain system reliability and prevent potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Implement strict access controls and monitoring on IBM i systems to limit local user privileges and detect unusual configuration changes related to referential constraints. 2. Enhance user awareness and training programs to reduce the risk of social engineering attacks that could enable privilege misuse. 3. Regularly audit file permissions and referential constraint configurations to identify and remediate improper privilege assignments. 4. Apply the latest IBM i security updates and patches as they become available, even though no patch link is currently provided, monitor IBM security advisories closely. 5. Employ multi-factor authentication and session monitoring for users with access to critical files to reduce the risk of unauthorized privilege use. 6. Consider implementing application-level controls or logging to detect and respond to abnormal file access patterns that may indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2024-05-09T16:27:14.739Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0f3c5b66c7f7acdd3ea67
Added to database: 10/4/2025, 10:15:33 AM
Last enriched: 10/4/2025, 10:21:24 AM
Last updated: 10/4/2025, 1:00:54 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-24910: CWE-732:IncorrectPermissionAssignmentforCriticalResource in checkpoint ZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,IdentityAgentforWindowsTerminalServer
HighCVE-2023-47488: n/a
MediumCVE-2023-48029: n/a
UnknownCVE-2023-47489: n/a
UnknownCVE-2023-48028: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.