CrowdSec
9/10CrowdSec Score

IBM Data Risk Manager - Authentication Bypass (CVE-2020-4427)

Published on07-05-2020
First seen on05-11-2025
Public ExploitCVSS 9.8/10IBM - Data Risk Manager

54Exploiting IPs reported

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.

CrowdSec analysis

CVE-2020-4427 is a critical vulnerability in IBM Data Risk Manager versions 2.0.1 through 2.0.6 that allows remote attackers to bypass SAML authentication by sending specially crafted HTTP requests. Exploiting this flaw could grant attackers full administrative access to the system, potentially leading to complete compromise of sensitive data and system controls.

CrowdSec has been tracking this vulnerability and its exploits since 29th of October 2025.

CrowdSec network observations suggest that most exploitation of CVE-2020-4427 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2020-4427 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2020-4427 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit the authentication bypass by sending crafted requests to the /albatross/saml/idpSelection endpoint, often using the userName=admin parameter to gain unauthorized administrative access.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.