CVE-2024-35139: CWE-276 Incorrect Default Permissions in IBM Security Verify Access Docker
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from the container due to incorrect default permissions. IBM X-Force ID: 292415.
AI Analysis
Technical Summary
CVE-2024-35139 is a vulnerability identified in IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1, caused by incorrect default permissions configured on the Docker container. This misconfiguration allows any local user on the host system to access sensitive information stored within the container environment. The vulnerability is classified under CWE-276, which pertains to incorrect default permissions that can lead to unauthorized information disclosure. Since the attack vector is local (AV:L), no network access is required, and no privileges or user interaction are necessary (PR:N/UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The incorrect permissions likely expose configuration files, credentials, or other sensitive data within the container filesystem. Although no public exploits have been reported, the risk exists primarily from malicious insiders or attackers who have already gained local access. IBM Security Verify Access is a critical identity and access management solution used in enterprise environments, often protecting sensitive authentication and authorization workflows. The vulnerability could allow attackers to gather information that facilitates further attacks or lateral movement within the network. The CVSS 3.1 base score of 6.2 reflects a medium severity, balancing the high confidentiality impact against the limited attack vector and lack of required privileges. Organizations should review container permission settings and restrict local user access to mitigate this vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2024-35139 is the potential exposure of sensitive authentication and access management data within IBM Security Verify Access Docker containers. This could lead to unauthorized disclosure of credentials or configuration details, enabling further compromise of enterprise identity infrastructure. The vulnerability does not directly allow remote exploitation or system takeover but increases risk from insider threats or attackers with local access. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on IBM Security Verify Access for identity management are particularly at risk. Exposure of sensitive data could undermine trust in authentication systems, lead to regulatory compliance issues under GDPR, and facilitate more severe attacks such as privilege escalation or lateral movement. Since the vulnerability affects containerized deployments, organizations using container orchestration platforms or shared hosting environments must be vigilant. The medium severity rating indicates a need for timely remediation to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2024-35139, European organizations should first identify all deployments of IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1. Since no official patches are currently linked, immediate steps include auditing and correcting container filesystem permissions to ensure sensitive files are not accessible to non-privileged local users. Implement strict host-level access controls and limit the number of users with local access to container hosts. Employ container security best practices such as running containers with the least privilege, using user namespaces, and applying mandatory access control (MAC) policies like AppArmor or SELinux to restrict container and host interactions. Monitor local user activities on container hosts for suspicious access patterns. Additionally, segregate container workloads and consider network segmentation to reduce the impact of a compromised host. Stay updated with IBM advisories for forthcoming patches or configuration guidance. Finally, conduct regular security assessments and penetration tests focusing on container environments to detect similar misconfigurations.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2024-35139: CWE-276 Incorrect Default Permissions in IBM Security Verify Access Docker
Description
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from the container due to incorrect default permissions. IBM X-Force ID: 292415.
AI-Powered Analysis
Technical Analysis
CVE-2024-35139 is a vulnerability identified in IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1, caused by incorrect default permissions configured on the Docker container. This misconfiguration allows any local user on the host system to access sensitive information stored within the container environment. The vulnerability is classified under CWE-276, which pertains to incorrect default permissions that can lead to unauthorized information disclosure. Since the attack vector is local (AV:L), no network access is required, and no privileges or user interaction are necessary (PR:N/UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The incorrect permissions likely expose configuration files, credentials, or other sensitive data within the container filesystem. Although no public exploits have been reported, the risk exists primarily from malicious insiders or attackers who have already gained local access. IBM Security Verify Access is a critical identity and access management solution used in enterprise environments, often protecting sensitive authentication and authorization workflows. The vulnerability could allow attackers to gather information that facilitates further attacks or lateral movement within the network. The CVSS 3.1 base score of 6.2 reflects a medium severity, balancing the high confidentiality impact against the limited attack vector and lack of required privileges. Organizations should review container permission settings and restrict local user access to mitigate this vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2024-35139 is the potential exposure of sensitive authentication and access management data within IBM Security Verify Access Docker containers. This could lead to unauthorized disclosure of credentials or configuration details, enabling further compromise of enterprise identity infrastructure. The vulnerability does not directly allow remote exploitation or system takeover but increases risk from insider threats or attackers with local access. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on IBM Security Verify Access for identity management are particularly at risk. Exposure of sensitive data could undermine trust in authentication systems, lead to regulatory compliance issues under GDPR, and facilitate more severe attacks such as privilege escalation or lateral movement. Since the vulnerability affects containerized deployments, organizations using container orchestration platforms or shared hosting environments must be vigilant. The medium severity rating indicates a need for timely remediation to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2024-35139, European organizations should first identify all deployments of IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1. Since no official patches are currently linked, immediate steps include auditing and correcting container filesystem permissions to ensure sensitive files are not accessible to non-privileged local users. Implement strict host-level access controls and limit the number of users with local access to container hosts. Employ container security best practices such as running containers with the least privilege, using user namespaces, and applying mandatory access control (MAC) policies like AppArmor or SELinux to restrict container and host interactions. Monitor local user activities on container hosts for suspicious access patterns. Additionally, segregate container workloads and consider network segmentation to reduce the impact of a compromised host. Stay updated with IBM advisories for forthcoming patches or configuration guidance. Finally, conduct regular security assessments and penetration tests focusing on container environments to detect similar misconfigurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2024-05-09T16:27:27.134Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092624fe7723195e0b47af
Added to database: 11/3/2025, 10:01:08 PM
Last enriched: 11/4/2025, 12:01:30 AM
Last updated: 12/15/2025, 12:23:58 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Next.js: 59k servers compromised in 48h - I breached the attackers' C2 and here's what I found
MediumCVE-2025-66388: CWE-201 Insertion of Sensitive Information Into Sent Data in Apache Software Foundation Apache Airflow
HighCVE-2025-11670: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Zohocorp ManageEngine ADManager Plus
MediumCVE-2025-37731: CWE-287 Improper Authentication in Elastic Elasticsearch
MediumCVE-2025-14714: CWE-288 Authentication Bypass Using an Alternate Path or Channel in The Document Foundation LibreOffice
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.