Critical Remote Code Execution Vulnerability Patched in IBM Operational Decision Manager

CVSScvssV3_1: 9.8

IBM Operational Decision Manager, a tool used for automating business decisions and processes, was found to have a deserialization vulnerability that could allow remote code execution.

The vulnerability, tracked as CVE-2024-22320 with a CVSS score of 9.8, resides in how IBM Operational Decision Manager handles deserialization of untrusted data. By sending a specially crafted request, an attacker could exploit this to execute arbitrary code on the affected system with full SYSTEM level privileges.

Deserialization vulnerabilities occur when an application deserializes untrusted data without proper validation. This can allow an attacker to execute malicious payloads if the deserialized data contains references to restricted classes or methods.

In this case, IBM Operational Decision Manager versions 8.10.3 through were affected. An attacker could potentially exploit the vulnerability to take full control of vulnerable systems. This would give them the ability to steal sensitive data, install malware, or conduct other malicious activities without authorization.

To protect themselves, users of IBM Operational Decision Manager should ensure they apply the latest updates to patch this vulnerability. Regularly checking for and applying security updates is critical to mitigate risks from newly discovered issues. Organizations should also implement network segmentation and access controls to limit the potential impact of any successful attacks.