IBM OpenPages Vulnerability Let Attackers Steal Authentication Credentials

CVE-2024-49344 (CVSS 4.3) leaves Watson Assistant chat sessions active post-logout, allowing reuse of cached credentials, while CVE-2024-49781 (CVSS 7.1) enables XML External Entity (XXE) attacks to extract hashed passwords from configuration files. Attackers could combine this with CVE-2024-49779 (CVSS 4.3), which bypasses CSRF protections by swapping session IDs and anti-CSRF tokens between accounts, enabling lateral movement across privileged roles. IBM’s continued investment in OpenPages’ security architecture, evidenced by 2024’s 38% reduction in CVSS 7.0+ vulnerabilities, demonstrates progress, but layered defenses remain essential. CVE-2024-49782 (CVSS 6.8): SSL/TLS certificate validation failures let attackers spoof mail servers, intercepting password reset links or exfiltrating sensitive reports. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Meanwhile, CVE-2024-49355 (CVSS 5.3) logs unsanitized user input when tracing is enabled, exposing session tokens and API keys in debug files. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. CVE-2024-49337 (CVSS 5.4): HTML injection in workflow-triggered emails permits phishing payloads using <script> tags masked as benign object metadata. While OpenPages’ newer versions employ registry ACLs, legacy deployments remain susceptible to similar credential extraction techniques. She is covering various cyber security incidents happening in the Cyber Space.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 20 Feb 2025 14:50:17 +0000


Cyber News related to IBM OpenPages Vulnerability Let Attackers Steal Authentication Credentials

CVE-2023-38738 - ...
1 year ago
IBM OpenPages Vulnerability Let Attackers Steal Authentication Credentials - CVE-2024-49344 (CVSS 4.3) leaves Watson Assistant chat sessions active post-logout, allowing reuse of cached credentials, while CVE-2024-49781 (CVSS 7.1) enables XML External Entity (XXE) attacks to extract hashed passwords from configuration files. ...
1 day ago Cybersecuritynews.com
Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets - Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control infrastructure before, in some cases, self-terminating. This article will ...
1 year ago Bleepingcomputer.com
IBM Heron Quantum Chip, Quantum System Two - Next generation quantum processor dubbed 'Heron', and the modular IBM Quantum System Two unveiled by Big Blue. IBM has unveiled two new quantum developments, with a new series of utility-scale processors housed within a modular quantum system. At its ...
1 year ago Silicon.co.uk
Passwordless Login: Effortless Authentication - Let's explore how passwordless login paves the way for seamless and secure user authentication, fostering trust and loyalty. The Password Dilemma Though conventional complex password-based authentication has long been a cornerstone of robust ...
1 year ago Feeds.dzone.com
What Is Kerberos Authentication?: Implementing Effective Security Protocols - Kerberos is a vital security protocol that any serious computer user must be familiar with. It is an open standard that provides a secure way of verifying the identity of user across multiple systems. The Kerberos authentication protocol is a ...
2 years ago Heimdalsecurity.com
How to Use Context-Based Authentication to Improve Security - One of the biggest security weak points for organizations involves their authentication processes. Context-based authentication offers an important tool in the battle against credential stuffing, man-in-the-middle attacks, MFA prompt bombing, and ...
1 year ago Securityboulevard.com
Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings - PRESS RELEASE. SANTA CLARA, Calif. and ARMONK, N.Y., May 15, 2024 /PRNewswire/ - Palo Alto Networks, the global cybersecurity leader, and IBM, a leading provider of hybrid cloud and AI, today announced a broad-reaching partnership to deliver ...
9 months ago Darkreading.com
CVE-2024-49337 - IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to HTML injection, caused by improper validation of user-supplied input of text fields used to construct workflow email notifications. A remote authenticated attacker could exploit ...
1 day ago Tenable.com
Content Credentials Show Promise, But Ecosystem Still Young - It's a good start, but an end-to-end workflow requires more: Cameras or smartphones to generate signed images, support for Content Credentials in a wide variety of image-editing software, and the ability to view authenticated metadata on social ...
1 day ago Darkreading.com
Biometric Authentication in Business: Enhancing Security - With its high level of security, convenience, user-friendliness, and accuracy, biometric authentication is paving the way for the future of secure authentication in the business world. One of the primary advantages of implementing biometric ...
1 year ago Securityzap.com
Selecting an Authentication Protocol for Your Business - Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. The protocols exchange information to verify the validity of the authentication ...
10 months ago Darkreading.com
Sophisticated Web Injection Campaign Targets 50,000 Individuals, Pilfering Banking Data - Web injections, a favoured technique employed by various banking Trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cybercriminals to manipulate data exchanges between users and web browsers, ...
1 year ago Cysecurity.news
Web Injection Campaign Targets 40 Banks, 50,000 Users - Dozens of banks around the word are in the crosshairs of a threat group using JavaScript web injections to steal users' bank account credentials. The campaign, which the hackers have been preparing for since December 2022 and which emerged in March, ...
1 year ago Securityboulevard.com
Defusing the threat of compromised credentials - In the end, some employees who were targeted approved the MFA requests and the attackers gained access to these accounts. Most phishing attacks employ similar social engineering techniques to trick users into turning over their credentials. Attackers ...
10 months ago Feedpress.me
What happens when you accidentally leak your AWS API keys? - My situation had no ill consequences, but it could have if I had used my actual email for the script or if my project was bigger and I had used AWS or another cloud provider and hardcoded those credentials. In a later class I did learn how to safely ...
11 months ago Isc.sans.edu
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit - IBM's surprise departure from cybersecurity software this week didn't just rearrange the competitive landscape - it also reshuffled the procurement plans and vendor relationships for many CISOs rebuilding their SOCs. IBM has agreed to sell the QRadar ...
9 months ago Darkreading.com
CVE-2024-49779 - IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages could allow a remote attacker to bypass security restrictions, caused by improper validation and management of authentication cookies. By modifying the CSRF token and Session Id cookie parameters ...
1 day ago Tenable.com
Biometric Authentication: Advancements and Challenges - Advancements in technology are driving the world of biometric authentication into a realm where one's very being serves as the key to accessing secure systems. The Evolution of Biometric Technology has significantly transformed the landscape of ...
11 months ago Securityzap.com
Best of 2023: Combo Lists & the Dark Web: Understanding Leaked Credentials - In today's interconnected, cloud-based world, user credentials are the keys that grant entry to the house that stores an organization's digital treasure. Just as burglars pick the lock on a physical house, cybercriminals use stolen credentials to ...
1 year ago Securityboulevard.com
CVE-2023-40683 - IBM OpenPages with Watson 8.3 and 9.0 could allow remote attacker to bypass security restrictions, caused by insufficient authorization checks. By authenticating as an OpenPages user and using non-public APIs, an attacker could exploit this ...
5 months ago
CVE-2024-49781 - IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory ...
1 day ago Tenable.com
CVE-2017-1148 - IBM OpenPages GRC Platform 7.2 and 7.3 with OpenPages Loss Event Entry (LEE) application could allow a user to obtain sensitive information including private APIs that could be used in further attacks against the system. IBM X-Force ID: 122201. ...
7 years ago
CVE-2024-49344 - IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages with Watson Assistant chat feature enabled the application establishes a session when a user logs in and uses chat, but the chat session is still left active after logout. ...
1 day ago Tenable.com
CVE-2024-49780 - IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing "dot dot" ...
1 day ago Tenable.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)