Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35139: CWE-276 Incorrect Default Permissions in IBM Security Verify Access Docker

0
Medium
VulnerabilityCVE-2024-35139cvecve-2024-35139cwe-276
Published: Fri Jun 28 2024 (06/28/2024, 15:42:04 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Verify Access Docker

Description

IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from the container due to incorrect default permissions. IBM X-Force ID: 292415.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:01:30 UTC

Technical Analysis

CVE-2024-35139 is a vulnerability identified in IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1, caused by incorrect default permissions configured on the Docker container. This misconfiguration allows any local user on the host system to access sensitive information stored within the container environment. The vulnerability is classified under CWE-276, which pertains to incorrect default permissions that can lead to unauthorized information disclosure. Since the attack vector is local (AV:L), no network access is required, and no privileges or user interaction are necessary (PR:N/UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The incorrect permissions likely expose configuration files, credentials, or other sensitive data within the container filesystem. Although no public exploits have been reported, the risk exists primarily from malicious insiders or attackers who have already gained local access. IBM Security Verify Access is a critical identity and access management solution used in enterprise environments, often protecting sensitive authentication and authorization workflows. The vulnerability could allow attackers to gather information that facilitates further attacks or lateral movement within the network. The CVSS 3.1 base score of 6.2 reflects a medium severity, balancing the high confidentiality impact against the limited attack vector and lack of required privileges. Organizations should review container permission settings and restrict local user access to mitigate this vulnerability.

Potential Impact

For European organizations, the primary impact of CVE-2024-35139 is the potential exposure of sensitive authentication and access management data within IBM Security Verify Access Docker containers. This could lead to unauthorized disclosure of credentials or configuration details, enabling further compromise of enterprise identity infrastructure. The vulnerability does not directly allow remote exploitation or system takeover but increases risk from insider threats or attackers with local access. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on IBM Security Verify Access for identity management are particularly at risk. Exposure of sensitive data could undermine trust in authentication systems, lead to regulatory compliance issues under GDPR, and facilitate more severe attacks such as privilege escalation or lateral movement. Since the vulnerability affects containerized deployments, organizations using container orchestration platforms or shared hosting environments must be vigilant. The medium severity rating indicates a need for timely remediation to prevent potential data breaches and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2024-35139, European organizations should first identify all deployments of IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.7.1. Since no official patches are currently linked, immediate steps include auditing and correcting container filesystem permissions to ensure sensitive files are not accessible to non-privileged local users. Implement strict host-level access controls and limit the number of users with local access to container hosts. Employ container security best practices such as running containers with the least privilege, using user namespaces, and applying mandatory access control (MAC) policies like AppArmor or SELinux to restrict container and host interactions. Monitor local user activities on container hosts for suspicious access patterns. Additionally, segregate container workloads and consider network segmentation to reduce the impact of a compromised host. Stay updated with IBM advisories for forthcoming patches or configuration guidance. Finally, conduct regular security assessments and penetration tests focusing on container environments to detect similar misconfigurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-05-09T16:27:27.134Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092624fe7723195e0b47af

Added to database: 11/3/2025, 10:01:08 PM

Last enriched: 11/4/2025, 12:01:30 AM

Last updated: 12/15/2025, 12:23:58 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats