Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56464: CWE-548 in IBM IBM QRadar SIEM

0
Low
VulnerabilityCVE-2024-56464cvecve-2024-56464cwe-548
Published: Tue Dec 09 2025 (12/09/2025, 13:26:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM QRadar SIEM

Description

IBM QRadar SIEM 7.5 - 7.5.0 UP14 IF01 is affected by an information disclosure vulnerability involving exposure of directory information. IBM has addressed this vulnerability in the latest update.

AI-Powered Analysis

AILast updated: 12/16/2025, 14:30:19 UTC

Technical Analysis

CVE-2024-56464 is classified under CWE-548, which pertains to unintended information exposure. This vulnerability affects IBM QRadar SIEM versions 7.5 through 7.5.0 UP14 IF01. QRadar SIEM is a widely used security information and event management platform that aggregates and analyzes security data for threat detection and compliance. The vulnerability involves the exposure of directory information, which means that an authenticated user with high privileges can access directory data that should be restricted. This could include file structures, configuration details, or other metadata that might assist an attacker in mapping the environment or identifying further attack vectors. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily because exploitation requires network access, low attack complexity, and high privileges, with no user interaction needed. The vulnerability does not impact integrity or availability, only confidentiality to a limited extent. IBM has addressed this issue in the latest update, though no public exploits or active exploitation have been reported. The vulnerability highlights the importance of strict access control and timely patching in SIEM environments, which are critical for enterprise security monitoring.

Potential Impact

For European organizations, the primary impact of this vulnerability is limited information disclosure that could aid an attacker in reconnaissance or lateral movement within the network. Since QRadar SIEM is often deployed in critical infrastructure, financial institutions, and large enterprises for security monitoring, any leakage of directory information could potentially expose sensitive configuration or operational details. However, the requirement for high privileges to exploit this vulnerability reduces the risk of widespread impact. Organizations that do not promptly apply patches or have weak internal access controls may face increased risk of targeted attacks leveraging this information. The confidentiality impact is low, with no direct effect on system integrity or availability. Nevertheless, given the strategic importance of SIEM systems in security operations, even minor leaks can undermine trust and complicate incident response efforts.

Mitigation Recommendations

1. Immediately apply the latest IBM QRadar SIEM patches that address CVE-2024-56464 to eliminate the vulnerability. 2. Review and tighten access controls to ensure that only necessary personnel have high-privilege access to QRadar systems. 3. Implement strict network segmentation to limit access to SIEM management interfaces to trusted administrative networks. 4. Conduct regular audits of user privileges and monitor for unusual access patterns within the SIEM environment. 5. Employ multi-factor authentication (MFA) for all high-privilege accounts to reduce the risk of credential compromise. 6. Maintain up-to-date inventory and version tracking of QRadar deployments to ensure timely patch management. 7. Educate security teams about the risks of information disclosure vulnerabilities and the importance of minimizing exposed metadata.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-12-26T12:50:20.773Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69382833abbdc4595cd48485

Added to database: 12/9/2025, 1:46:27 PM

Last enriched: 12/16/2025, 2:30:19 PM

Last updated: 2/4/2026, 12:24:45 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats