Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51463: CWE-918 Server-Side Request Forgery (SSRF)

0
Medium
VulnerabilityCVE-2024-51463cvecve-2024-51463cwe-918
Published: Sat Dec 21 2024 (12/21/2024, 13:46:01 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.3, 7.4, and 7.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:27:35 UTC

Technical Analysis

CVE-2024-51463 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting IBM i operating system versions 7.3, 7.4, and 7.5. SSRF vulnerabilities occur when an attacker can abuse a server to send crafted requests to unintended destinations, often internal network resources that are otherwise inaccessible externally. In this case, an authenticated attacker with legitimate access to the IBM i system can exploit this flaw to make the system send unauthorized HTTP or other protocol requests. This can lead to network enumeration, allowing the attacker to map internal services and potentially identify further vulnerabilities or targets for exploitation. The vulnerability impacts confidentiality by potentially exposing internal network details and integrity by enabling unauthorized requests that could manipulate internal services. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and privileges (authenticated user) but no user interaction. There is no impact on availability. No public exploits are known at this time, but the vulnerability is published and should be addressed proactively. The lack of patches currently listed suggests that IBM may be preparing a fix or that mitigations need to be applied at the network or configuration level. The vulnerability is significant for environments where IBM i systems are integrated into critical business processes or internal networks, as SSRF can be a stepping stone for more severe attacks such as lateral movement, data exfiltration, or privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2024-51463 can be substantial, especially in sectors relying heavily on IBM i systems such as finance, manufacturing, and government services. The SSRF vulnerability allows attackers to bypass perimeter defenses by leveraging the trusted position of the IBM i system within internal networks. This can lead to unauthorized access to sensitive internal services, potentially exposing confidential data or enabling further exploitation chains. The integrity of internal communications may be compromised if attackers manipulate requests to internal APIs or services. Although availability is not directly affected, the indirect consequences of successful exploitation could disrupt business operations. The requirement for authentication limits the attack surface but does not eliminate risk, particularly if credential theft or insider threats are present. European organizations with complex network architectures and interconnected systems may find it challenging to detect and contain SSRF exploitation without proper monitoring and segmentation.

Mitigation Recommendations

1. Implement strict access controls on IBM i systems to limit authenticated user privileges to only those necessary, reducing the risk of misuse. 2. Apply network segmentation to isolate IBM i systems from sensitive internal services, minimizing the impact of SSRF-induced requests. 3. Monitor outbound traffic from IBM i systems for unusual or unauthorized requests, using intrusion detection systems or network monitoring tools. 4. Enforce strong authentication mechanisms and regularly audit user accounts to prevent credential compromise. 5. Restrict the IBM i system’s ability to initiate network connections to only trusted destinations via firewall rules or host-based controls. 6. Stay informed about IBM’s security advisories and apply patches promptly once available. 7. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities within the IBM i environment. 8. Educate system administrators about SSRF risks and encourage vigilance for suspicious system behavior or logs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-10-28T10:50:10.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092eea35043901e82cab3b

Added to database: 11/3/2025, 10:38:34 PM

Last enriched: 11/3/2025, 11:27:35 PM

Last updated: 12/20/2025, 7:30:44 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats