CVSS 3.1 Score 5.1 of 10 (medium)


Published Feb 17, 2024
Updated: Feb 20, 2024
CWE ID 532


CVE-2024-22335 is a vulnerability that affects IBM QRadar Suite versions through and IBM Cloud Pak for Security versions through, allowing local users to read potentially sensitive information stored in log files. The vulnerability has a base severity rating of MEDIUM and a base score of 5.1 according to the CVSS:3.1 rating system. The confidentiality impact is rated as HIGH, and the exploitability score is 1.4 out of 10, indicating a relatively low risk for exploitation. There is no requirement for user interaction or privileged access to exploit this vulnerability, and the attack vector is classified as LOCAL with no integrity or availability impact on the affected systems specified. To remediate this vulnerability, organizations using the affected IBM products should update to the latest versions available or apply any patches or security updates provided by IBM promptly. This vulnerability poses a potential danger to organizations as it allows local users with access to the affected systems to read sensitive information stored in log files, potentially exposing confidential data and compromising the security and privacy of an organization's information assets. It's important for organizations to proactively address this vulnerability by applying the necessary updates and ensuring that proper access controls are in place to limit unauthorized access to sensitive log files, thereby mitigating the risk of exploitation and data exposure. (CVE ID: CVE-2024-22335; Source: [email protected])

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-22335 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options