Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35141: CWE-250 Execution with Unnecessary Privileges in IBM Security Verify Access Docker

0
High
VulnerabilityCVE-2024-35141cvecve-2024-35141cwe-250
Published: Thu Dec 19 2024 (12/19/2024, 01:10:05 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Verify Access Docker

Description

IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:02:04 UTC

Technical Analysis

CVE-2024-35141 is a vulnerability identified in IBM Security Verify Access Docker versions 10.0.0 through 10.0.6, categorized under CWE-250, which involves execution with unnecessary privileges. This flaw allows a local attacker who already has limited access to the system to escalate their privileges by exploiting the improper execution context of certain processes or commands within the Docker container environment. The vulnerability arises because some components or scripts run with higher privileges than necessary, violating the principle of least privilege. This can lead to unauthorized access to sensitive data, modification of system configurations, or disruption of services. The vulnerability does not require user interaction but does require local access, which could be obtained through other means such as compromised credentials or insider threats. The CVSS v3.1 score of 7.8 indicates a high severity, with a vector of AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack is local, requires low complexity, low privileges, no user interaction, and impacts confidentiality, integrity, and availability significantly. No public exploits are known yet, but the vulnerability's nature suggests it could be leveraged in targeted attacks or lateral movement scenarios within compromised networks. IBM has not yet published patches, so mitigation currently relies on access restrictions and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to enterprises and government entities that deploy IBM Security Verify Access Docker for identity and access management. Successful exploitation could lead to full system compromise, exposing sensitive personal data protected under GDPR, disrupting critical authentication services, and enabling further lateral movement within networks. The impact on confidentiality, integrity, and availability is high, potentially resulting in data breaches, service outages, and loss of trust. Organizations in sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on robust access controls and the critical nature of their services. Additionally, the local attack vector means insider threats or attackers who have gained initial footholds could escalate privileges rapidly, complicating incident response and remediation efforts.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local access to systems running IBM Security Verify Access Docker to trusted personnel only, enforcing strict role-based access controls and multi-factor authentication. 2) Monitor and audit local user activities and Docker container executions to detect anomalous privilege escalations or unauthorized process executions. 3) Apply container security best practices such as running containers with the least privileges necessary, disabling unnecessary capabilities, and using user namespaces to isolate container processes. 4) Segregate critical identity management infrastructure from general user environments to limit exposure. 5) Stay informed on IBM’s security advisories and apply patches or updates immediately once available. 6) Employ endpoint detection and response (EDR) solutions capable of identifying privilege escalation attempts within containerized environments. 7) Conduct regular security assessments and penetration testing focused on privilege escalation vectors within container deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-05-09T16:27:36.634Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092624fe7723195e0b47b9

Added to database: 11/3/2025, 10:01:08 PM

Last enriched: 11/4/2025, 12:02:04 AM

Last updated: 12/19/2025, 2:38:19 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats