Sploit.io - Search

Product: i, version: 7.27.3

CVE-2019-4381

Severity: Unknown

Description: IBM i 7.27.3 Clustering could allow a local attacker to obtain sensitive information, caused by the use of advanced node failure detection using the REST API to interface with the HMC. An attacker could exploit this vulnerability to obtain HMC credentials. IBM X-Force ID: 162159.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000520000
  • Percentile: 0.162840000
  • Date: 2026-02-09

ExploitDB

No data available.

HackerOne Data

  • Rank: 8677
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • IBM i - Versions: 7.27.3

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2019-4381 affects IBM i 7.27.3 Clustering, enabling a local attacker to potentially obtain sensitive information, specifically HMC credentials. The root cause is related to the advanced node failure detection mechanism utilizing the REST API interface with the Hardware Management Console (HMC). The vulnerability has a CVSS v3.0 base score of 5.9 (Medium severity). While exploitation requires local access, it doesn't necessitate elevated privileges. This indicates a moderate level of ease of exploitation. The primary impact is on confidentiality – successful exploitation leads to the compromise of HMC credentials. Integrity and availability are less directly impacted, although compromised HMC credentials could indirectly lead to further integrity or availability issues depending on the privileges associated with those credentials. The EPSS score of 0.00052 suggests a relatively low, but non-negligible, probability of exploitation in real-world scenarios. The business impact could range from unauthorized access to system management functions to potential disruption of clustered services if the HMC credentials grant sufficient control.

    2. Potential Attack Scenarios
    A potential attack scenario involves a local user gaining access to a system running IBM i 7.27.3 Clustering. This user, potentially a system administrator or someone with physical access to the server, can exploit the vulnerability through the REST API. The attacker initiates a request to the HMC via the REST API during node failure detection. By analyzing the response, or through manipulation of the request, they can extract the HMC credentials. These credentials can then be used to manage the IBM i environment, potentially leading to unauthorized configuration changes, performance degradation, or even denial of service. The attack vector is local, requiring the attacker to be on the same network as the IBM i system. The process involves identifying the REST API endpoint used for node failure detection, crafting a request, and analyzing the response for the HMC credentials. The outcome is the successful compromise of HMC credentials, providing the attacker with significant control over the IBM i clustered environment.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to apply the official fix provided by IBM. IBM released a patch to address this vulnerability. You can find details and download the fix from: https://www.ibm.com/support/docview.wss?uid=ibm10887369. In addition to patching, consider implementing these measures: Regularly review HMC user accounts and their associated privileges. Implement strong password policies for HMC credentials. Monitor HMC activity for unusual or unauthorized access attempts. Segment the network to limit access to the IBM i system and HMC. Consider using multi-factor authentication for HMC access where feasible. Regularly audit the REST API endpoints used for node failure detection to ensure they are securely configured.

    4. Executive Summary
    CVE-2019-4381 is a vulnerability in IBM i 7.27.3 Clustering that allows a local attacker to potentially steal HMC credentials. While exploitation requires local access, it doesn’t need high privileges, making it a moderate risk to the organization. Compromised HMC credentials can lead to unauthorized management of the IBM i environment, potentially impacting critical business services. The recommended solution is to apply the official patch provided by IBM as soon as possible. Prompt action is crucial to protect the integrity and availability of the IBM i clustered environment, and to prevent potential disruption to business operations. Ignoring this vulnerability could allow attackers to gain significant control over key infrastructure.