Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45675: CWE-309 Use of Password System for Primary Authentication in IBM Informix Dynamic Server

0
High
VulnerabilityCVE-2024-45675cvecve-2024-45675cwe-309
Published: Tue Dec 02 2025 (12/02/2025, 02:00:26 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Informix Dynamic Server

Description

IBM Informix Dynamic Server 14.10 could allow a local user on the system to log into the Informix server as administrator without a password.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:25:42 UTC

Technical Analysis

CVE-2024-45675 identifies a critical authentication bypass vulnerability in IBM Informix Dynamic Server version 14.10. The vulnerability arises from the improper implementation of the password system used for primary authentication, categorized under CWE-309 (Use of Password System for Primary Authentication). Specifically, a local attacker with access to the host system can log into the Informix server as an administrator without needing to provide any password credentials. This bypass occurs because the authentication mechanism fails to enforce password verification properly, allowing privilege escalation to administrative levels. The vulnerability requires local access but does not require any prior privileges or user interaction, making it easier for an attacker who has gained local system access to fully compromise the database server. The impact includes complete loss of confidentiality, integrity, and availability of data managed by the Informix server, as the attacker gains administrative control. The CVSS v3.1 base score is 8.4, reflecting high severity due to the ease of exploitation and the critical impact on system security. No patches or fixes have been published yet, and no known exploits have been reported in the wild. Organizations running IBM Informix Dynamic Server 14.10 should consider this vulnerability a critical risk and take immediate steps to mitigate exposure until a vendor patch is available.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially those relying on IBM Informix Dynamic Server 14.10 for critical business applications and data management. Unauthorized administrative access could lead to data breaches involving sensitive personal or corporate data, violating GDPR and other data protection regulations. Attackers could manipulate or delete data, disrupt database availability, or use the compromised server as a foothold for further network intrusion. The local access requirement limits remote exploitation but does not eliminate risk, as insider threats or attackers who gain initial system access through other means can leverage this vulnerability. The impact is particularly severe for sectors such as finance, healthcare, government, and critical infrastructure, where database integrity and availability are paramount. The lack of a patch increases the urgency for interim controls to prevent exploitation and detect suspicious activity.

Mitigation Recommendations

Immediate mitigation steps include restricting local system access to trusted personnel only and enforcing strict access controls on servers running Informix Dynamic Server 14.10. Organizations should implement robust host-based monitoring and logging to detect unauthorized login attempts or privilege escalations. Network segmentation can limit lateral movement if an attacker gains local access. Until IBM releases an official patch, consider disabling or restricting Informix server access on vulnerable hosts where feasible. Regularly audit user accounts and permissions on affected systems to ensure no unauthorized changes occur. Engage with IBM support for updates on patch availability and apply vendor fixes promptly once released. Additionally, conduct security awareness training to reduce insider threat risks and ensure rapid incident response capabilities are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-09-03T13:50:43.964Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e50a4f2f793a7de7cda09

Added to database: 12/2/2025, 2:36:20 AM

Last enriched: 12/9/2025, 4:25:42 AM

Last updated: 1/18/2026, 1:27:35 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats