Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39746: CWE-319 Cleartext Transmission of Sensitive Information in IBM Sterling Connect:Direct Web Services

0
Medium
VulnerabilityCVE-2024-39746cvecve-2024-39746cwe-319
Published: Thu Aug 22 2024 (08/22/2024, 10:29:54 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Direct Web Services

Description

IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.

AI-Powered Analysis

AILast updated: 10/31/2025, 15:14:21 UTC

Technical Analysis

CVE-2024-39746 affects IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3. The vulnerability stems from the product's failure to properly enable HTTP Strict Transport Security (HSTS), a security mechanism that forces web browsers and clients to interact with servers only over secure HTTPS connections. Without HSTS, an attacker positioned on the network path can downgrade or intercept HTTP traffic, capturing sensitive information transmitted in cleartext. This vulnerability is categorized under CWE-319, which concerns cleartext transmission of sensitive information. The CVSS v3.1 base score is 5.9 (medium), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and high confidentiality impact. The vulnerability does not affect integrity or availability. Exploitation involves man-in-the-middle techniques to intercept data during transmission. While no patches or exploits are currently reported, the lack of HSTS enforcement leaves communications vulnerable to interception, especially in environments where SSL/TLS is not strictly enforced or where users may inadvertently access the service over HTTP. This vulnerability is particularly relevant for organizations relying on IBM Sterling Connect:Direct Web Services for secure file transfers and business-critical data exchange.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data transmitted via IBM Sterling Connect:Direct Web Services. Given the product's role in secure file transfer, interception of data could lead to exposure of proprietary business information, personal data protected under GDPR, or other confidential communications. The impact is heightened in sectors such as finance, healthcare, and manufacturing, where data sensitivity is paramount. Although the vulnerability does not compromise data integrity or system availability, the breach of confidentiality alone can result in regulatory penalties, reputational damage, and loss of customer trust. The medium CVSS score reflects that exploitation requires network access and some complexity, but no credentials or user interaction, making it a realistic threat in environments with insufficient network security controls. European organizations with remote or distributed workforces, or those relying on unsecured networks, are particularly vulnerable to man-in-the-middle attacks exploiting this flaw.

Mitigation Recommendations

To mitigate CVE-2024-39746, organizations should immediately verify and enforce the use of HTTPS for all IBM Sterling Connect:Direct Web Services communications. Specifically, they must enable HTTP Strict Transport Security (HSTS) headers on the web service endpoints to ensure clients only connect over secure channels. Network administrators should audit firewall and proxy configurations to block or redirect any HTTP traffic to HTTPS. Additionally, implementing TLS 1.2 or higher with strong cipher suites is critical to prevent downgrade attacks. Organizations should conduct network monitoring for unusual traffic patterns indicative of man-in-the-middle attempts. Where possible, segment the network to limit exposure of the service to untrusted networks. Regularly update and patch IBM Sterling Connect:Direct Web Services as vendor updates become available. Finally, educate users and administrators about the risks of accessing services over unsecured connections and enforce strict security policies around remote access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-06-28T09:34:46.056Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c4b66c7f7acdd3ea21

Added to database: 10/4/2025, 10:15:32 AM

Last enriched: 10/31/2025, 3:14:21 PM

Last updated: 11/30/2025, 5:40:25 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats