Sploit.io - Search

Product: i Access Client Solutions, version: >= 1.1.4.3, <= 1.1.9.3

CVE-2023-45182

Severity: HIGH

Description: IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 is vulnerable to having its key for an encrypted password decoded. By somehow gaining access to the encrypted password, a local attacker could exploit this vulnerability to obtain the password to other systems. IBM X-Force ID: 268265.

CVSS Score: 7.4

Priority

A+

CISA Data

EPSS Data

  • EPSS: 0.006290000
  • Percentile: 0.702690000
  • Date: 2026-04-14

ExploitDB

No data available.

HackerOne Data

  • Rank: 9088
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

Nuclei Templates

No data available.

VulnCheck Data

Affected Products:

  • IBM i Access Client Solutions - Versions: 1.1.2, 1.1.4.3

References:

Risk Assessment

1. Risk Assessment
The vulnerability CVE-2023-45182 affects IBM i Access Client Solutions versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3. It centers around the insecure storage of a key used to encrypt passwords within the application. While the attacker needs access to the encrypted password itself, successful exploitation allows decoding of the key, ultimately revealing the stored password. The CVSS score of 7.4 (HIGH) indicates a significant risk. The attack vector is network accessible, though requires low privileges to exploit once access to the encrypted password is achieved. The likelihood of exploitation is moderate, as it depends on an attacker gaining access to the encrypted password, which could be through various means like credential stuffing, phishing, or compromised endpoints. The impact is categorized as low for confidentiality, integrity, and availability. A successful exploit allows an attacker to potentially gain access to systems authenticated with the compromised password, potentially leading to data breaches or unauthorized access. The EPSS score of 0.006290000 indicates a relatively low, but present, probability of exploitation in the wild.

2. Potential Attack Scenarios
An attacker could leverage this vulnerability in a scenario where a user has reused their IBM i Access Client Solutions password across multiple systems. The attacker first compromises a less critical system where the user employs the same password. Once the attacker obtains the encrypted password from the IBM i Access Client Solutions installation, they can use the decoded key to reveal the plain text password. With the plain text password in hand, the attacker can then attempt to authenticate to other systems where the user has reused the same credentials, potentially gaining access to more valuable resources. This scenario highlights the risk of password reuse and the cascading effect of a successful compromise. The attack vector is primarily through network access and the exploitation occurs locally on the machine where the encrypted password resides. The outcome could range from minor inconvenience to significant data breach depending on the importance of the systems using the compromised password.

3. Mitigation Recommendations
The primary mitigation is to upgrade IBM i Access Client Solutions to a version beyond 1.1.9.3, if a newer version is available. IBM provides updated versions addressing this vulnerability. Refer to the IBM support page for the latest version and installation instructions: https://www.ibm.com/support/pages/node/7091942. As an immediate action, organizations should consider password rotation for users of IBM i Access Client Solutions, particularly if they suspect their passwords may be reused across other systems. Encourage users to employ strong, unique passwords. Implement multi-factor authentication (MFA) where possible to add an extra layer of security. Monitor for anomalous login activity to detect potential exploitation attempts. Regularly review and update password policies to minimize the impact of compromised credentials. The IBM X-Force ID 268265 provides further details on the vulnerability and its impact: https://exchange.xforce.ibmcloud.com/vulnerabilities/268265.

4. Executive Summary
IBM i Access Client Solutions is vulnerable to a password decoding issue (CVE-2023-45182) that could allow attackers to gain access to other systems. The vulnerability arises from the insecure storage of the key used to encrypt passwords within the application. While not immediately catastrophic, a successful exploit could lead to unauthorized access and potential data breaches, particularly if users reuse passwords. The risk is considered high, with a moderate likelihood of exploitation. We recommend upgrading to the latest version of IBM i Access Client Solutions (beyond 1.1.9.3) as soon as possible. Additionally, encourage users to use strong, unique passwords, and enable multi-factor authentication where available. Addressing this vulnerability is crucial to protecting sensitive data and maintaining the integrity of our systems. Prompt action will minimize the potential impact of a successful attack.

CVE-2023-45184

Severity: MEDIUM

Description: IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to obtain a decryption key due to improper authority checks. IBM X-Force ID: 268270.

CVSS Score: 6.2

Priority

A+

CISA Data

EPSS Data

  • EPSS: 0.077520000
  • Percentile: 0.919520000
  • Date: 2026-04-14

ExploitDB

No data available.

HackerOne Data

  • Rank: 9088
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

Nuclei Templates

No data available.

VulnCheck Data

Affected Products:

  • IBM i Access Client Solutions - Versions: 1.1.2, 1.1.4.3

References:

Risk Assessment

1. Risk Assessment
The vulnerability CVE-2023-45184 affects IBM i Access Client Solutions versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3. The root cause is improper authority checks allowing an attacker to potentially obtain a decryption key. This is a medium severity vulnerability with a CVSS score of 6.2. The vulnerability primarily impacts confidentiality, with a high potential for disclosure of sensitive information. Integrity and availability are not directly impacted. The attack vector is local, meaning the attacker requires some level of access to the system running the i Access Client Solutions. However, the attack complexity is low, and no user interaction is required, making exploitation relatively easy once local access is gained. The EPSS score of 0.077520000 suggests a moderate likelihood of exploitation in the wild. Business impact could range from exposure of proprietary data to compromise of user credentials used within the IBM i environment, depending on what data is being decrypted.

2. Potential Attack Scenarios
An attacker gains local access to a workstation where IBM i Access Client Solutions is installed, perhaps through a compromised user account or a software vulnerability on the workstation itself. The attacker then leverages the improper authority checks in the i Access Client Solutions to obtain the decryption key used to encrypt data transferred to and from the IBM i system. This decryption key can then be used to decrypt sensitive data such as customer records, financial data, or internal documents. The attacker doesn’t necessarily need to directly compromise the IBM i system itself, but the data decrypted provides valuable information about the IBM i environment. A successful attack could allow the attacker to eavesdrop on communications or manipulate data after decryption, depending on the specific use of the decrypted data.

3. Mitigation Recommendations
The primary mitigation for CVE-2023-45184 is to upgrade IBM i Access Client Solutions to a version that is not affected. Specifically, upgrade to version 1.1.9.4 or later. This will implement the necessary authority checks to prevent unauthorized access to the decryption key. Immediate patching should be prioritized for systems handling sensitive data. Review network segmentation and access controls to limit the potential impact should local access be gained to a workstation. Regularly monitor systems for signs of compromise, particularly focusing on data exfiltration. Refer to the IBM support page for detailed upgrade instructions: https://www.ibm.com/support/pages/node/7091942. Additionally, consult the IBM X-Force ID for further information: https://exchange.xforce.ibmcloud.com/vulnerabilities/268270.

4. Executive Summary
IBM i Access Client Solutions is vulnerable to a security flaw (CVE-2023-45184) that could allow an attacker to obtain a decryption key and expose sensitive data. While the attacker requires some level of local access, the vulnerability is relatively easy to exploit. The primary impact is a potential loss of data confidentiality. We recommend upgrading to version 1.1.9.4 or later of IBM i Access Client Solutions as quickly as possible to mitigate this risk. This is especially crucial if the i Access Client Solutions is used to access or process sensitive business data. Proactive patching will minimize the risk of data breach and maintain the integrity of our IBM i environment. Failing to address this vulnerability could lead to the exposure of customer data, financial records, or other valuable information, impacting our business operations and reputation.

CVE-2023-45185

Severity: HIGH

Description: IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273.

CVSS Score: 7.4

Priority

A+

CISA Data

EPSS Data

  • EPSS: 0.015120000
  • Percentile: 0.812080000
  • Date: 2026-04-13

ExploitDB

No data available.

HackerOne Data

  • Rank: 9088
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

Nuclei Templates

No data available.

VulnCheck Data

Affected Products:

  • IBM i Access Client Solutions - Versions: 1.1.2, 1.1.4.3

References:

Risk Assessment

1. Risk Assessment
The vulnerability CVE-2023-45185 affects IBM i Access Client Solutions versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3. It’s characterized by improper authority checks allowing an attacker to execute remote code with the privileges of the user running the client. The CVSS score of 7.4 (HIGH) indicates a significant risk. The attack vector is network-based, meaning an attacker doesn’t need local access. Exploitation is relatively easy (Low Attack Complexity) and requires only Low privileges. The scope is changed, meaning the vulnerability can impact components beyond the directly vulnerable one. Impacts include low levels of confidentiality, integrity, and availability. The EPSS score of 0.015120000 suggests a relatively low but still present probability of exploitation in the wild. Business impact could range from data breaches (low confidentiality impact) to system compromises and potential disruption of operations (low integrity and availability impacts). Given the network-based attack vector and relatively low privilege requirement, exploitation is reasonably likely, particularly in environments where the i Access Client Solutions is exposed to untrusted networks.

2. Potential Attack Scenarios
An attacker leveraging CVE-2023-45185 could exploit the vulnerability by sending a crafted request to the IBM i Access Client Solutions application. Assume a user is logged into the client and connected to the IBM i server. The attacker, potentially through a man-in-the-middle attack or by exploiting a vulnerable network connection, can send a malicious request that leverages the improper authority checks. This request could be triggered by a specially crafted data transfer or function call. The attacker's code will then execute on the user's workstation with the user’s permissions. Potential outcomes include stealing user credentials, installing malware, or gaining access to resources the user has access to on the network. This could lead to broader compromise of the IBM i system depending on the user's privileges and the actions the attacker takes post-exploitation. The GitHub exploit (https://github.com/afine-com/CVE-2023-45185) provides a concrete example of how this can be achieved.

3. Mitigation Recommendations
The primary mitigation for CVE-2023-45185 is to upgrade to a patched version of IBM i Access Client Solutions. IBM recommends upgrading to a version later than 1.1.9.3. This ensures the improper authority checks are corrected. In the interim, organizations can implement compensating controls. These include network segmentation to limit the exposure of the client to untrusted networks, and ensuring users operate with the principle of least privilege, minimizing the impact if compromised. Regularly monitor network traffic for suspicious activity related to the client. Regularly review user accounts and permissions to ensure they align with business needs. Relevant resources include the IBM support page (https://www.ibm.com/support/pages/node/7091942) and the IBM X-Force ID: 268273 (https://exchange.xforce.ibmcloud.com/vulnerabilities/268273).

4. Executive Summary
IBM i Access Client Solutions is vulnerable to a remote code execution flaw (CVE-2023-45185). This means an attacker could potentially run code on a user’s computer with the same privileges as the user, potentially compromising data and disrupting operations. The vulnerability is relatively easy to exploit over the network, posing a moderate to high risk to organizations using affected versions (1.1.2 – 1.1.4 and 1.1.4.3 – 1.1.9.3). The most effective way to address this vulnerability is to upgrade to the latest version of IBM i Access Client Solutions. Prompt action is recommended to minimize the risk of a successful attack and protect sensitive data and system availability. Delaying patching increases the likelihood of exploitation and potential business impact.