{"vulnerability": "CVE-2024-56347", "sightings": [{"uuid": "871496be-bb2e-4659-b785-89d7a3bfded0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56347", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lktt6j42ijf2", "content": "", "creation_timestamp": "2025-03-20T23:13:40.750559Z"}, {"uuid": "cbd986e6-4f50-4067-bbbc-1d65c5968599", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/timb_machine/statuses/114197292316490754", "content": "", "creation_timestamp": "2025-03-20T23:13:57.638270Z"}, {"uuid": "471c5686-327f-4200-89d7-6ec454d3da0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114184473948206209", "content": "", "creation_timestamp": "2025-03-18T16:53:22.835936Z"}, {"uuid": "696d5dc8-9231-4b77-8e59-f83d16fba2f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lko7n34c5q2u", "content": "", "creation_timestamp": "2025-03-18T17:40:21.214742Z"}, {"uuid": "7b6ed6bf-15a7-4aa1-a214-0ad88bef8908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114184692980438498", "content": "", "creation_timestamp": "2025-03-18T17:49:05.003017Z"}, {"uuid": "63da7f7b-558f-4d34-9339-19c4539654d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoii2fi6726", "content": "", "creation_timestamp": "2025-03-18T20:18:43.551073Z"}, {"uuid": "ee553dc8-8ffc-41fd-9843-ee03a32e909c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkz45grwas2c", "content": "", "creation_timestamp": "2025-03-23T01:37:12.965186Z"}, {"uuid": "6047f8bd-788e-4291-b07d-625c11cad653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lkur54ggbp2o", "content": "", "creation_timestamp": "2025-03-21T08:09:31.781371Z"}, {"uuid": "bf4fd790-6553-4300-989c-681e44ce5326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqcemuk24", "content": "", "creation_timestamp": "2025-03-19T11:00:08.955981Z"}, {"uuid": "3c20fe52-fe5c-47fc-be15-17febcda5bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkoriuptj72q", "content": "", "creation_timestamp": "2025-03-18T23:00:10.750343Z"}, {"uuid": "4745c22a-b26a-4ab1-adf6-24373cad6cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d731742b-dac0288c73b84244", "content": "", "creation_timestamp": "2025-11-18T19:38:20.521071Z"}, {"uuid": "c2e50a0b-d466-4ef1-94ac-d5bd6f619ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lla4f4sckc2d", "content": "", "creation_timestamp": "2025-03-25T20:30:09.217422Z"}, {"uuid": "3eddba2b-86ef-4e8d-8adc-b0f2eff25398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkv3knzpvs2q", "content": "", "creation_timestamp": "2025-03-21T11:16:08.134835Z"}, {"uuid": "a050971a-4207-4b41-b4e3-b6444a34ff50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114187718620579610", "content": "", "creation_timestamp": "2025-03-19T06:38:34.973890Z"}, {"uuid": "a7284805-febd-4de8-91f2-3ba3c016af74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56347\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.\n\ud83d\udccf Published: 2025-03-18T16:16:09.506Z\n\ud83d\udccf Modified: 2025-03-19T03:55:54.102Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7186621", "creation_timestamp": "2025-03-19T04:48:48.000000Z"}, {"uuid": "b9e73765-0cc8-443c-822a-1caf70f28ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/cvedetector/20594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56347 - IBM AIX nimsh SSL/TLS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56347 \nPublished : March 18, 2025, 5:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T20:15:05.000000Z"}, {"uuid": "b40b6097-fd90-4f8d-9574-32295a9cd034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/CyberBulletin/2727", "content": "\u26a1Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\nVeeam Backup (CVE-2025-23120, 9.9/10)\nAffects v12.3.0.310 &amp; earlier\nAllows RCE by authenticated users\nFixed in v12.3.1 (12.3.1.1139)\n\nIBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\nAffects AIX 7.2 &amp; 7.3\nExploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-21T06:44:57.000000Z"}, {"uuid": "4f0013f8-8af2-407a-ac0f-b3cc18ad80c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/thehackernews/6526", "content": "Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\n\ud83d\udd34 Veeam Backup (CVE-2025-23120, 9.9/10)\n\u27a1\ufe0f Affects v12.3.0.310 &amp; earlier\n\u27a1\ufe0f Allows RCE by authenticated users\n\u27a1\ufe0f Fixed in v12.3.1 (12.3.1.1139)\n\n\ud83d\udd34 IBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\n\u27a1\ufe0f Affects AIX 7.2 &amp; 7.3\n\u27a1\ufe0f Exploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\nFull details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html", "creation_timestamp": "2025-03-20T15:03:48.000000Z"}]}