<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>IBM — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/ibm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 22:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/ibm/feed.xml" rel="self" type="application/rss+xml"/><item><title>IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</guid><description>IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.</description><content:encoded><![CDATA[<p>CVE-2026-6389 affects IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6. The vulnerability stems from the agent granting excessive cluster-wide permissions within IBM Turbonomic Application Resource Management. A successful exploit allows an attacker who has compromised the operator or its associated service account to gain unrestricted read access to all secrets within the cluster. This vulnerability was reported on April 30, 2026, and poses a significant risk to organizations using the affected versions, potentially leading to complete cluster compromise. Defenders should prioritize patching and monitoring for unauthorized access to sensitive resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the Kubernetes cluster, potentially through exploiting a vulnerability in a separate application or service running within the cluster, or via compromised credentials.</li>
<li>The attacker identifies the IBM Turbonomic prometurbo agent and its associated service account within the compromised cluster.</li>
<li>The attacker leverages the compromised service account or operator to interact with the Kubernetes API, exploiting the excessive cluster-wide permissions granted to the prometurbo agent.</li>
<li>The attacker utilizes the unrestricted read access to enumerate and exfiltrate sensitive credentials stored as secrets within the cluster, including database passwords, API keys, and other sensitive information.</li>
<li>Using the stolen credentials, the attacker escalates privileges by accessing other services and resources within the cluster, such as deploying malicious pods or modifying existing deployments.</li>
<li>The attacker achieves persistence by creating or modifying service accounts, roles, and role bindings to maintain access to the cluster even if the initial point of compromise is remediated.</li>
<li>The attacker moves laterally within the cluster, compromising additional nodes and workloads to expand their control and access to sensitive data.</li>
<li>The attacker achieves full cluster compromise, gaining complete control over all resources and data within the Kubernetes environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-6389 can lead to a full compromise of the Kubernetes cluster. This includes unrestricted access to sensitive data and the ability to control all workloads and resources within the environment. The impact includes potential data breaches, service disruptions, and significant financial and reputational damage. Organizations in any sector using the affected versions of IBM Turbonomic are at risk, and the severity is heightened in environments handling sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Turbonomic prometurbo agent to a version beyond 8.17.6 to patch CVE-2026-6389.</li>
<li>Review and restrict the permissions granted to the prometurbo agent service account, adhering to the principle of least privilege (reference: CVE-2026-6389).</li>
<li>Implement Kubernetes audit logging to monitor for unauthorized access to secrets and other sensitive resources (reference: Kubernetes documentation).</li>
<li>Deploy the Sigma rule &ldquo;Detect Kubernetes Secret Access via Turbonomic Agent&rdquo; to identify potential exploitation attempts (reference: Sigma rule below).</li>
<li>Monitor for unusual activity originating from the prometurbo agent service account, such as attempts to access or exfiltrate large amounts of data (reference: network_connection log source).</li>
<li>Implement network segmentation to limit the potential impact of a compromised cluster, preventing lateral movement to other environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>credential-access</category><category>kubernetes</category><category>vulnerability</category></item><item><title>IBM Langflow Desktop Vulnerable to Remote Command Execution (CVE-2026-6543)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-langflow-rce/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-langflow-rce/</guid><description>IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to remote command execution, allowing an attacker to execute arbitrary commands with the privileges of the Langflow process, potentially leading to sensitive data exposure and lateral movement.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop, a tool designed to build and experiment with language models, versions 1.0.0 through 1.8.4, contains a remote command execution vulnerability (CVE-2026-6543). An attacker with the ability to influence Langflow&rsquo;s execution can inject and execute arbitrary commands with the same privileges as the Langflow process. This flaw can be exploited to read sensitive environment variables containing API keys and database credentials, modify critical files, and propagate further attacks within the internal network. The vulnerability poses a significant risk to organizations utilizing affected versions of Langflow Desktop, potentially leading to data breaches and system compromise. Defenders should prioritize patching or implementing mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with Langflow Desktop installed (versions 1.0.0 - 1.8.4). This could be achieved through social engineering or by compromising a user account with access to the system.</li>
<li>The attacker crafts a malicious input or payload designed to exploit the command execution vulnerability within Langflow.</li>
<li>The attacker triggers Langflow to process the malicious payload, leveraging the vulnerability to inject and execute arbitrary commands.</li>
<li>The injected command executes with the privileges of the Langflow process, allowing the attacker to interact with the underlying operating system.</li>
<li>The attacker leverages command execution to read sensitive environment variables, potentially obtaining API keys, database credentials, or other sensitive information.</li>
<li>The attacker uses the acquired credentials to access sensitive data or systems within the internal network, escalating their privileges and expanding their reach.</li>
<li>The attacker modifies critical files or installs malicious software, establishing persistence and compromising the integrity of the system.</li>
<li>The attacker launches further attacks on the internal network, leveraging the compromised system as a pivot point to compromise additional systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6543 allows attackers to execute arbitrary commands on systems running vulnerable versions of IBM Langflow Desktop. This can lead to the exposure of sensitive environment variables containing API keys and database credentials, the modification of critical files, and the launching of further attacks on the internal network. The impact can range from data breaches and system compromise to complete control over affected systems and networks. Given the nature of Langflow, targeted sectors likely include organizations involved in AI/ML development and related fields.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Langflow Desktop to a patched version beyond 1.8.4 to remediate CVE-2026-6543, as recommended by IBM.</li>
<li>Deploy the Sigma rule &ldquo;Detect Langflow Process Spawning Suspicious Processes&rdquo; to identify potential exploitation attempts based on unusual child processes spawned by Langflow.</li>
<li>Monitor network connections from Langflow Desktop instances for suspicious outbound traffic, indicating potential data exfiltration or command-and-control activity.</li>
<li>Implement least privilege principles to limit the impact of successful exploitation by restricting the permissions of the Langflow process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2026-6543</category><category>command execution</category><category>code injection</category><category>ibm langflow</category></item><item><title>IBM Langflow Desktop Unauthenticated Image Access via IDOR</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-idor/</link><pubDate>Thu, 30 Apr 2026 21:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-idor/</guid><description>IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to an indirect object reference (IDOR) vulnerability (CVE-2026-4503), allowing unauthenticated users to view other users' images due to a user-controlled key.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop versions 1.0.0 through 1.8.4 are susceptible to an indirect object reference (IDOR) vulnerability, designated as CVE-2026-4503. This flaw enables unauthenticated attackers to access and view images belonging to other users. The vulnerability arises from the application&rsquo;s reliance on a user-controlled key to reference objects, which can be manipulated to bypass authorization checks and gain unauthorized access to sensitive image data. This poses a risk to user privacy and data security, as attackers can potentially view confidential or personal images without proper authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a user-controlled key used to reference image objects within Langflow Desktop.</li>
<li>The attacker modifies this key to point to another user&rsquo;s image object.</li>
<li>The attacker sends a request to the Langflow Desktop application using the modified key.</li>
<li>The application, due to the IDOR vulnerability, fails to properly validate the attacker&rsquo;s authorization to access the requested image object.</li>
<li>The application retrieves and returns the image data associated with the targeted user&rsquo;s image.</li>
<li>The attacker views the image without authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to view other users&rsquo; images within IBM Langflow Desktop. This can lead to a breach of privacy, as sensitive or personal images may be exposed. The number of affected users depends on the number of installations of Langflow Desktop within the vulnerable version range (1.0.0 through 1.8.4).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch or upgrade to a version of IBM Langflow Desktop that addresses CVE-2026-4503 as detailed in the IBM advisory.</li>
<li>Implement stricter authorization checks on image object references to prevent unauthorized access, mitigating CVE-2026-4503.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>idor</category><category>vulnerability</category><category>privilege-escalation</category></item><item><title>IBM WebSphere Liberty Identity Spoofing Vulnerability (CVE-2026-3621)</title><link>https://feed.craftedsignal.io/briefs/2026-04-websphere-spoofing/</link><pubDate>Thu, 23 Apr 2026 00:18:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-websphere-spoofing/</guid><description>IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.4 are susceptible to identity spoofing when applications are deployed without proper authentication and authorization configurations, potentially leading to unauthorized access and privilege escalation.</description><content:encoded><![CDATA[<p>CVE-2026-3621 identifies an identity spoofing vulnerability affecting IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.4. This vulnerability arises when applications are deployed on WebSphere Liberty without authentication or authorization mechanisms configured. An attacker could potentially exploit this flaw to impersonate legitimate users or services, gaining unauthorized access to resources and performing actions on their behalf. This vulnerability was reported to IBM and assigned a CVSS v3.1 base score of 7.5, indicating a high potential impact. Successful exploitation allows for unauthorized actions and data access within the vulnerable WebSphere Liberty environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a WebSphere Liberty instance running a vulnerable version (17.0.0.3 - 26.0.0.4).</li>
<li>The attacker determines that an application is deployed on the WebSphere Liberty instance without proper authentication or authorization configurations.</li>
<li>The attacker crafts a malicious request, spoofing the identity of a legitimate user. This might involve manipulating HTTP headers or other request parameters.</li>
<li>The malicious request is sent to the vulnerable application on the WebSphere Liberty server.</li>
<li>The WebSphere Liberty server, lacking proper authentication checks, processes the request under the forged identity.</li>
<li>The attacker gains unauthorized access to resources or performs actions associated with the spoofed identity.</li>
<li>The attacker can potentially escalate privileges by accessing administrative functions or sensitive data accessible to the spoofed user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3621 can lead to significant consequences. An attacker could gain unauthorized access to sensitive data, modify application configurations, or perform actions on behalf of legitimate users, potentially leading to data breaches, service disruption, or complete system compromise. The vulnerability is particularly concerning for organizations that rely on WebSphere Liberty for critical applications and have not implemented proper authentication and authorization controls. The number of affected organizations is currently unknown but will depend on the prevalence of vulnerable WebSphere Liberty instances deployed without adequate security measures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate authentication and authorization configurations to all applications deployed on IBM WebSphere Application Server Liberty to mitigate CVE-2026-3621, as described in <a href="https://www.ibm.com/support/pages/node/7270437">IBM&rsquo;s advisory</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect WebSphere Liberty Unauthorized Access Attempt&rdquo; to identify suspicious requests lacking authentication headers.</li>
<li>Upgrade to a non-vulnerable version of IBM WebSphere Application Server Liberty outside the range of 17.0.0.3 through 26.0.0.4.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-3621</category><category>websphere</category><category>identity spoofing</category><category>cwe-269</category></item><item><title>IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</link><pubDate>Thu, 23 Apr 2026 00:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</guid><description>An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.</description><content:encoded><![CDATA[<p>CVE-2026-5935 describes a critical vulnerability affecting IBM Total Storage Service Console (TSSC) / TS4500 IMC software. Specifically, versions 9.2, 9.3, 9.4, 9.5, and 9.6 are susceptible to unauthenticated remote command execution. The vulnerability stems from insufficient validation of user-supplied input, allowing an attacker to inject and execute arbitrary commands on the system. Successful exploitation grants the attacker normal user privileges. This vulnerability poses a significant risk as it allows attackers to compromise the system without authentication, potentially leading to data breaches, system disruption, or further lateral movement within the network. Defenders should prioritize patching or mitigating this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC instance running versions 9.2, 9.3, 9.4, 9.5, or 9.6.</li>
<li>The attacker crafts a malicious request containing an OS command injection payload. This payload is designed to exploit the improper input validation within the TSSC/IMC software.</li>
<li>The attacker sends the crafted request to the vulnerable TSSC/IMC instance, targeting a specific endpoint or function susceptible to command injection.</li>
<li>The TSSC/IMC software processes the request without proper validation, passing the malicious payload to the underlying operating system.</li>
<li>The operating system executes the injected command with the privileges of a normal user account.</li>
<li>The attacker gains the ability to execute arbitrary commands on the system, potentially allowing them to read sensitive files, modify configurations, or install malicious software.</li>
<li>The attacker may leverage their initial access to escalate privileges, move laterally within the network, or establish persistent access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5935 allows an unauthenticated attacker to execute arbitrary commands on the affected IBM Total Storage Service Console (TSSC) / TS4500 IMC system. This can lead to complete system compromise, data breaches, and disruption of services. The impact could range from unauthorized access to sensitive data to the deployment of ransomware, depending on the attacker&rsquo;s objectives and the level of access achieved after exploitation. Due to the lack of authentication requirement, the vulnerability is highly critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a fixed version of IBM Total Storage Service Console (TSSC) / TS4500 IMC as outlined in the IBM advisory (<a href="https://www.ibm.com/support/pages/node/7270127">https://www.ibm.com/support/pages/node/7270127</a>).</li>
<li>Deploy the Sigma rule to detect command execution via web requests targeting TSSC/IMC.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the TSSC/IMC system.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5935</category><category>rce</category><category>command injection</category></item><item><title>Process Execution from Suspicious Windows Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</guid><description>Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.</description><content:encoded><![CDATA[<p>This detection identifies process execution from suspicious default Windows directories. Attackers may hide malware in trusted paths to evade defenses, making it difficult for analysts to distinguish between legitimate and malicious activity. The detection focuses on identifying processes running from directories like C:\PerfLogs, C:\Users\Public, and various Windows subdirectories (e.g., C:\Windows\Tasks, C:\Windows\AppReadiness), where executable files are not typically expected to reside. The detection excludes known legitimate processes like SpeechUXWiz.exe, SystemSettings.exe, TrustedInstaller.exe and other Intel and IBM executables to reduce false positives. This technique is often used to bypass security controls or take advantage of existing exceptions applied to these directories. This activity was observed being used by threat actors in the Siestagraph campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker drops a malicious executable into a suspicious directory like C:\Users\Public or C:\Windows\Tasks.</li>
<li>The attacker executes the malware from the unusual directory. This might be achieved using <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The executed malware establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The malware connects to a command-and-control (C2) server to receive further instructions.</li>
<li>The C2 server instructs the malware to perform reconnaissance on the network.</li>
<li>The malware attempts to move laterally to other systems on the network using techniques like pass-the-hash or exploiting vulnerabilities.</li>
<li>The attacker achieves their objective, such as data exfiltration, ransomware deployment, or establishing long-term access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, persistence on the system, and further compromise of the network. Attackers can use this technique to bypass security controls and evade detection, potentially leading to data breaches, financial loss, or disruption of services. While the rule itself has a medium severity, the impact of a successful attack using this technique can be severe, depending on the attacker&rsquo;s objectives and the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Process Execution from Unusual Directory&rdquo; to your SIEM and tune for your environment to detect suspicious process execution.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the process execution is legitimate or malicious.</li>
<li>Enable process creation logging, specifically Event ID 4688 with command line process auditing, to ensure the Sigma rule has the necessary data to function effectively.</li>
<li>Review and harden permissions on the listed suspicious directories to prevent unauthorized file creation and execution.</li>
<li>Block execution of unsigned or untrusted executables from these directories using application control solutions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>masquerading</category></item></channel></rss>