Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39744: CWE-352 Cross-Site Request Forgery (CSRF) in IBM Sterling Connect:Direct Web Services

0
Medium
VulnerabilityCVE-2024-39744cvecve-2024-39744cwe-352
Published: Thu Aug 22 2024 (08/22/2024, 10:56:39 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Direct Web Services

Description

IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

AI-Powered Analysis

AILast updated: 03/14/2026, 18:46:39 UTC

Technical Analysis

CVE-2024-39744 identifies a Cross-Site Request Forgery (CSRF) vulnerability in IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3. CSRF vulnerabilities occur when a web application does not adequately verify that requests received are intentionally sent by authenticated users, allowing attackers to craft malicious requests that execute unauthorized actions on behalf of the user. In this case, the vulnerability allows an attacker to exploit the trust relationship between the user and the web service by inducing the user to perform unwanted actions, such as altering configurations or initiating file transfers, without their knowledge. The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required by the attacker, but requiring user interaction. The vulnerability impacts the integrity of the system but does not affect confidentiality or availability. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. IBM Sterling Connect:Direct Web Services is widely used in enterprise environments for secure and reliable file transfer operations, making this vulnerability relevant to organizations relying on this product for critical business processes.

Potential Impact

The primary impact of CVE-2024-39744 is on the integrity of IBM Sterling Connect:Direct Web Services environments. An attacker can leverage this vulnerability to cause authenticated users to unknowingly execute unauthorized actions, potentially disrupting file transfer workflows or modifying configurations. While confidentiality and availability are not directly affected, unauthorized actions could indirectly lead to operational disruptions or data integrity issues. Organizations with automated or critical file transfer processes may face increased risk of business process interference or compliance violations if attackers exploit this vulnerability. The requirement for user interaction limits the ease of exploitation but does not eliminate risk, especially in environments where users might be targeted via phishing or social engineering. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability remains a concern for organizations using affected versions, particularly those with high-value data transfers or regulatory obligations.

Mitigation Recommendations

To mitigate CVE-2024-39744, organizations should implement the following specific measures: 1) Apply any available IBM patches or updates as soon as they are released to address the CSRF vulnerability directly. 2) If patches are not yet available, implement compensating controls such as enforcing strict anti-CSRF tokens in web requests and validating the origin and referer headers to ensure requests are legitimate. 3) Harden user authentication mechanisms by enabling multi-factor authentication (MFA) to reduce the risk of session hijacking or unauthorized access. 4) Educate users about phishing and social engineering tactics that could be used to induce them to perform malicious actions. 5) Monitor logs and network traffic for unusual or unauthorized requests targeting Sterling Connect:Direct Web Services endpoints. 6) Restrict access to the web service interfaces to trusted networks or VPNs to reduce exposure to external attackers. 7) Regularly review and audit user permissions and roles to minimize the potential impact of unauthorized actions. These targeted steps go beyond generic advice by focusing on both technical and procedural controls tailored to the nature of the CSRF vulnerability in this specific product.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-06-28T09:34:46.056Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b5ad022f860ef9432515c8

Added to database: 3/14/2026, 6:46:26 PM

Last enriched: 3/14/2026, 6:46:39 PM

Last updated: 3/16/2026, 12:29:04 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses