Skip to main content

CVE-2024-45641: CWE-295 Improper Certificate Validation in IBM Security ReaQta EDR

Medium
VulnerabilityCVE-2024-45641cvecve-2024-45641cwe-295
Published: Tue May 20 2025 (05/20/2025, 15:27:45 UTC)
Source: CVE
Vendor/Project: IBM
Product: Security ReaQta EDR

Description

IBM Security ReaQta EDR 3.12 could allow an attacker to perform unauthorized actions due to improper SSL certificate validation.

AI-Powered Analysis

AILast updated: 07/04/2025, 10:56:04 UTC

Technical Analysis

CVE-2024-45641 is a medium-severity vulnerability identified in IBM Security ReaQta EDR version 3.12, categorized under CWE-295, which pertains to improper certificate validation. This vulnerability arises due to the product's failure to correctly validate SSL/TLS certificates during secure communications. Improper certificate validation can allow an attacker to perform man-in-the-middle (MitM) attacks by presenting a fraudulent or self-signed certificate that the vulnerable client accepts as valid. Consequently, an attacker could intercept, modify, or inject malicious commands or data into the communication stream between the EDR agent and its management or update servers. Given that IBM Security ReaQta EDR is an endpoint detection and response solution designed to monitor and respond to security threats on endpoints, exploitation of this vulnerability could allow unauthorized actions such as injecting false telemetry data, disabling security features, or manipulating detection and response workflows. The CVSS 3.1 base score of 6.5 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits have been reported in the wild to date, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes. The vulnerability is significant because it undermines the trust model of secure communications, which is critical for EDR solutions that rely on secure telemetry and command channels to function effectively and securely.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for those relying on IBM Security ReaQta EDR 3.12 for endpoint security. Exploitation could lead to unauthorized interception and manipulation of endpoint security data, potentially allowing attackers to evade detection, disable security controls, or inject malicious commands. This could compromise the integrity of security monitoring and incident response processes, increasing the risk of undetected breaches or prolonged dwell time of attackers within networks. Confidentiality could be partially impacted if sensitive telemetry data is intercepted. Although availability is not directly affected, the overall security posture and trustworthiness of the EDR solution would be undermined, potentially leading to broader security incidents. Given the regulatory environment in Europe, including GDPR and NIS2 directives, such a compromise could also lead to compliance violations and associated penalties. Organizations in critical infrastructure sectors, finance, healthcare, and government may face heightened risks due to the strategic importance of their data and systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if IBM has released patches or updates addressing CVE-2024-45641 and apply them promptly. In the absence of official patches, organizations should consider the following specific measures: 1) Enforce strict certificate pinning or validation policies within the EDR deployment if configurable, ensuring only trusted certificates are accepted. 2) Use network-level controls such as TLS interception detection tools and intrusion detection systems to monitor for anomalous SSL/TLS traffic that could indicate MitM attempts. 3) Restrict network access to EDR management and update servers to trusted IP ranges and enforce strong network segmentation to limit exposure. 4) Conduct regular security audits and penetration tests focusing on SSL/TLS communications of the EDR solution. 5) Monitor EDR logs for unusual activity that could indicate exploitation attempts, such as unexpected configuration changes or telemetry anomalies. 6) Educate security teams about this vulnerability to increase vigilance. These targeted actions go beyond generic patching advice and focus on reducing attack surface and early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-09-03T13:50:17.060Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaef5

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 10:56:04 AM

Last updated: 8/20/2025, 8:54:18 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats