CVE-2024-43169: CWE-494 Download of Code Without Integrity Check in IBM Engineering Requirements Management DOORS Next
CVE-2024-43169 is a high-severity vulnerability in IBM Engineering Requirements Management DOORS Next versions 7. 0. 2, 7. 0. 3, and 7. 1. It involves the download of code without verifying its integrity, allowing an attacker to deliver malicious files to users. Exploitation requires no privileges but does require user interaction. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-43169 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The core issue is a CWE-494 weakness, where the software allows users to download code or files without performing any integrity verification, such as cryptographic signature or hash validation. This flaw enables an attacker to craft malicious files that, when downloaded and executed or processed by the user, can compromise the system. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact metrics indicate high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), meaning a successful exploit could lead to full system compromise, data theft, or disruption of service. The vulnerability does not require prior authentication, making it accessible to remote attackers. Although no exploits are currently known in the wild, the potential for targeted attacks exists, especially in environments where IBM DOORS Next is used for managing critical engineering requirements. The lack of integrity checks on downloaded code is a fundamental security oversight that can be leveraged for supply chain attacks or malware delivery. IBM has not yet published patches, so organizations must monitor for updates and apply them promptly once available.
Potential Impact
The potential impact of CVE-2024-43169 is significant for organizations using IBM Engineering Requirements Management DOORS Next. Because the vulnerability allows downloading malicious files without integrity verification, attackers can deliver malware, ransomware, or backdoors to compromise systems. This can lead to unauthorized access to sensitive engineering data, intellectual property theft, disruption of project workflows, and potential sabotage of critical engineering processes. The high confidentiality impact means sensitive design and requirements data could be exposed, while the high integrity impact implies attackers could alter or inject malicious code into project files. The high availability impact suggests attackers might disrupt or disable the software, affecting business continuity. Industries such as aerospace, automotive, defense, and manufacturing, which rely heavily on IBM DOORS Next for requirements management, face increased risk of espionage and operational disruption. The vulnerability’s ease of exploitation (no privileges required, network accessible) increases the likelihood of attacks, especially spear-phishing or social engineering campaigns to induce user interaction. The absence of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly.
Mitigation Recommendations
1. Monitor IBM security advisories closely and apply official patches or updates for DOORS Next versions 7.0.2, 7.0.3, and 7.1 immediately upon release. 2. Until patches are available, restrict network access to IBM DOORS Next servers to trusted IPs and enforce strict firewall rules to limit exposure. 3. Implement application whitelisting and endpoint protection solutions to detect and block execution of unauthorized or suspicious files downloaded via DOORS Next. 4. Educate users on the risks of interacting with unexpected or suspicious downloads within the DOORS Next environment to reduce the chance of social engineering exploitation. 5. Use network security tools such as intrusion detection/prevention systems (IDS/IPS) and sandboxing to analyze and block malicious payloads before they reach end users. 6. Employ cryptographic verification mechanisms at the organizational level for any code or files imported into DOORS Next, if feasible, to supplement the missing integrity checks. 7. Conduct regular security audits and penetration testing focused on the software supply chain and download processes within the engineering environment. 8. Consider isolating DOORS Next environments from general user networks to contain potential compromises.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, France, South Korea, Netherlands
CVE-2024-43169: CWE-494 Download of Code Without Integrity Check in IBM Engineering Requirements Management DOORS Next
Description
CVE-2024-43169 is a high-severity vulnerability in IBM Engineering Requirements Management DOORS Next versions 7. 0. 2, 7. 0. 3, and 7. 1. It involves the download of code without verifying its integrity, allowing an attacker to deliver malicious files to users. Exploitation requires no privileges but does require user interaction. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-43169 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The core issue is a CWE-494 weakness, where the software allows users to download code or files without performing any integrity verification, such as cryptographic signature or hash validation. This flaw enables an attacker to craft malicious files that, when downloaded and executed or processed by the user, can compromise the system. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact metrics indicate high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), meaning a successful exploit could lead to full system compromise, data theft, or disruption of service. The vulnerability does not require prior authentication, making it accessible to remote attackers. Although no exploits are currently known in the wild, the potential for targeted attacks exists, especially in environments where IBM DOORS Next is used for managing critical engineering requirements. The lack of integrity checks on downloaded code is a fundamental security oversight that can be leveraged for supply chain attacks or malware delivery. IBM has not yet published patches, so organizations must monitor for updates and apply them promptly once available.
Potential Impact
The potential impact of CVE-2024-43169 is significant for organizations using IBM Engineering Requirements Management DOORS Next. Because the vulnerability allows downloading malicious files without integrity verification, attackers can deliver malware, ransomware, or backdoors to compromise systems. This can lead to unauthorized access to sensitive engineering data, intellectual property theft, disruption of project workflows, and potential sabotage of critical engineering processes. The high confidentiality impact means sensitive design and requirements data could be exposed, while the high integrity impact implies attackers could alter or inject malicious code into project files. The high availability impact suggests attackers might disrupt or disable the software, affecting business continuity. Industries such as aerospace, automotive, defense, and manufacturing, which rely heavily on IBM DOORS Next for requirements management, face increased risk of espionage and operational disruption. The vulnerability’s ease of exploitation (no privileges required, network accessible) increases the likelihood of attacks, especially spear-phishing or social engineering campaigns to induce user interaction. The absence of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly.
Mitigation Recommendations
1. Monitor IBM security advisories closely and apply official patches or updates for DOORS Next versions 7.0.2, 7.0.3, and 7.1 immediately upon release. 2. Until patches are available, restrict network access to IBM DOORS Next servers to trusted IPs and enforce strict firewall rules to limit exposure. 3. Implement application whitelisting and endpoint protection solutions to detect and block execution of unauthorized or suspicious files downloaded via DOORS Next. 4. Educate users on the risks of interacting with unexpected or suspicious downloads within the DOORS Next environment to reduce the chance of social engineering exploitation. 5. Use network security tools such as intrusion detection/prevention systems (IDS/IPS) and sandboxing to analyze and block malicious payloads before they reach end users. 6. Employ cryptographic verification mechanisms at the organizational level for any code or files imported into DOORS Next, if feasible, to supplement the missing integrity checks. 7. Conduct regular security audits and penetration testing focused on the software supply chain and download processes within the engineering environment. 8. Consider isolating DOORS Next environments from general user networks to contain potential compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2024-08-07T13:29:17.951Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43d85912abc71d624a1
Added to database: 2/26/2026, 7:51:25 PM
Last enriched: 2/26/2026, 9:30:47 PM
Last updated: 2/26/2026, 10:45:28 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-42056: n/a
MediumCVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition
MediumCVE-2024-32902: Denial of service in Google Android
HighCVE-2024-27218: Information disclosure in Google Android
MediumCVE-2026-3264: Execution After Redirect in go2ismail Free-CRM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.