Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43192: CWE-352 Cross-Site Request Forgery (CSRF) in IBM Storage TS4500 Library

0
Medium
VulnerabilityCVE-2024-43192cvecve-2024-43192cwe-352
Published: Sat Sep 27 2025 (09/27/2025, 01:14:43 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Storage TS4500 Library

Description

IBM Storage TS4500 Library 1.11.0.0 and 2.11.0.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:19:22 UTC

Technical Analysis

CVE-2024-43192 is a Cross-Site Request Forgery (CSRF) vulnerability identified in IBM Storage TS4500 Library versions 1.11.0.0 and 2.11.0.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application in which the user is currently authenticated. In this case, the IBM Storage TS4500 Library's web interface does not adequately verify that requests originate from legitimate users, allowing attackers to craft malicious requests that the system trusts and executes. The vulnerability does not impact confidentiality directly but can lead to unauthorized modification of system configurations or operations, compromising the integrity of the storage management environment. The CVSS 3.1 score of 6.5 (medium severity) reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts integrity (I:H) without affecting confidentiality or availability. The vulnerability scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly concerning because the IBM Storage TS4500 Library is used for managing tape storage systems, which are critical for data backup and archival in enterprise environments. Unauthorized actions could disrupt backup operations or corrupt stored data indirectly through misconfiguration or malicious commands executed via CSRF attacks.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for enterprises relying on IBM Storage TS4500 for critical backup and archival storage. Successful exploitation could allow attackers to perform unauthorized actions such as altering backup schedules, deleting or corrupting backup configurations, or triggering operations that could disrupt data protection workflows. This could lead to data integrity issues, increased risk of data loss, and operational downtime. Given the reliance on tape storage for long-term data retention in sectors like finance, healthcare, and government, any disruption could have regulatory compliance implications under GDPR and other data protection laws. Additionally, the indirect impact on business continuity and disaster recovery plans could be severe if backup data becomes unreliable or inaccessible due to malicious manipulation. Since the vulnerability requires user interaction, phishing or social engineering campaigns targeting administrators or operators of the TS4500 Library web interface could be a likely attack vector.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately restrict access to the IBM Storage TS4500 Library management interface to trusted networks and users only, ideally via VPN or secure management VLANs. 2) Employ multi-factor authentication (MFA) for all users accessing the management interface to reduce the risk of compromised credentials being exploited. 3) Educate administrators and operators about phishing and social engineering risks to prevent inadvertent triggering of malicious requests. 4) Monitor web server logs for unusual or unexpected POST requests that could indicate CSRF attempts. 5) Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF patterns targeting the TS4500 interface. 6) Regularly review and audit backup configurations and logs to detect unauthorized changes promptly. 7) Engage with IBM support to obtain updates on patches or workarounds and apply them as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-08-07T13:29:48.160Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c7b66c7f7acdd3eac8

Added to database: 10/4/2025, 10:15:35 AM

Last enriched: 10/4/2025, 10:19:22 AM

Last updated: 10/4/2025, 1:01:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats