Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56464: CWE-548 in IBM IBM QRadar SIEM

0
Low
VulnerabilityCVE-2024-56464cvecve-2024-56464cwe-548
Published: Tue Dec 09 2025 (12/09/2025, 13:26:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM QRadar SIEM

Description

IBM QRadar SIEM 7.5 - 7.5.0 UP14 IF01 is affected by an information disclosure vulnerability involving exposure of directory information. IBM has addressed this vulnerability in the latest update.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:07:52 UTC

Technical Analysis

CVE-2024-56464 is an information disclosure vulnerability identified in IBM QRadar SIEM versions 7.5 to 7.5.0 UP14 IF01. The vulnerability is classified under CWE-548, which pertains to unintended exposure of information to unauthorized actors. Specifically, this flaw allows an attacker with network access and high-level privileges to obtain directory information that should otherwise be restricted. The exposure of directory information can aid attackers in mapping the system environment, potentially facilitating further attacks or reconnaissance activities. The vulnerability does not require user interaction and does not impact the integrity or availability of the system, limiting its severity. IBM has acknowledged the issue and addressed it in the latest updates, though no public exploits have been reported to date. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited scope and impact. Given that QRadar SIEM is widely used for security event management and monitoring, any information disclosure could assist attackers in evading detection or planning more sophisticated attacks. The vulnerability requires high privileges to exploit, indicating that attackers would need to have already compromised or have insider access to the system. This reduces the likelihood of external exploitation but highlights the importance of strict access controls and monitoring of privileged accounts.

Potential Impact

For European organizations, the impact of CVE-2024-56464 is primarily related to potential reconnaissance and information gathering by malicious insiders or attackers who have already gained elevated privileges. Exposure of directory information could reveal system structure, configuration details, or sensitive paths that attackers could leverage to escalate privileges or evade detection. While the vulnerability does not directly compromise data integrity or availability, the indirect effects could facilitate more damaging attacks if combined with other vulnerabilities or social engineering. Organizations in sectors such as finance, government, energy, and critical infrastructure that rely heavily on IBM QRadar SIEM for security monitoring could face increased risk if this vulnerability is exploited. Additionally, regulatory compliance frameworks in Europe, such as GDPR, emphasize the protection of sensitive information, and any unauthorized disclosure—even of directory information—could have compliance implications. The low CVSS score and requirement for high privileges limit the overall risk, but the strategic importance of QRadar in security operations means that even minor information leaks warrant prompt remediation.

Mitigation Recommendations

To mitigate CVE-2024-56464, European organizations should immediately apply the latest IBM QRadar SIEM patches that address this vulnerability. Beyond patching, organizations should enforce strict access controls to limit high-privilege account usage and monitor these accounts for unusual activity. Implement network segmentation to restrict access to QRadar management interfaces only to trusted administrators. Employ robust logging and alerting mechanisms to detect attempts to access directory information or other sensitive data. Regularly audit user permissions and remove unnecessary high-level privileges. Conduct internal security awareness training to reduce the risk of insider threats. Additionally, consider deploying endpoint detection and response (EDR) solutions to identify lateral movement or privilege escalation attempts that could precede exploitation. Finally, maintain an up-to-date asset inventory to quickly identify and remediate vulnerable QRadar instances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-12-26T12:50:20.773Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69382833abbdc4595cd48485

Added to database: 12/9/2025, 1:46:27 PM

Last enriched: 12/9/2025, 2:07:52 PM

Last updated: 12/11/2025, 6:31:53 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats