CVE-2024-53865
Python vulnerability analysis and mitigation

Overview

The Python package 'zhmcclient', a client library for the IBM Z HMC Web Services API, contains a vulnerability (CVE-2024-53865) where password-like properties are written in clear text into its HMC and API logs. This vulnerability was discovered and disclosed on November 29, 2024, affecting versions prior to 1.18.1 (GitHub Advisory).

Technical details

The vulnerability occurs when specific password-related properties are logged in clear text through the Python loggers named 'zhmcclient.api' and 'zhmcclient.hmc'. The affected properties include 'boot-ftp-password', 'ssc-master-pw', 'zaware-master-pw', 'password', and 'bind-password' during various operations such as partition creation/updates, LPAR updates, image activation profile modifications, HMC user management, and LDAP server definition configurations. The vulnerability has been assigned a CVSS v3.1 base score of 8.2 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (GitHub Advisory).

Impact

The exposure of password-like properties in clear text logs poses a significant security risk as it could lead to unauthorized access to sensitive systems and data. This vulnerability only affects users who have enabled the specific Python loggers and use the functions that handle these sensitive properties (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in zhmcclient version 1.18.1. Users are advised to upgrade to this version or later. There are no known workarounds for this vulnerability, making the upgrade the only effective mitigation strategy (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management