CVE-2021-29755
📋 TL;DR
IBM QRadar SIEM versions 7.3, 7.4, and 7.5 fail to properly validate SSL/TLS certificates for some inter-host communications. This allows attackers to perform man-in-the-middle attacks and intercept or manipulate sensitive data between QRadar components. Organizations running these specific QRadar versions are affected.
💻 Affected Systems
- IBM QRadar SIEM
📦 What is this software?
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
⚠️ Risk & Real-World Impact
Worst Case
Attackers intercept administrative credentials, sensitive log data, or configuration information, leading to full system compromise and data exfiltration.
Likely Case
Attackers intercept unencrypted or weakly authenticated communications between QRadar components, potentially gaining access to security event data.
If Mitigated
With proper network segmentation and certificate validation enabled, impact is limited to potential denial of service or minor data leakage.
🎯 Exploit Status
Requires network access to intercept communications between QRadar hosts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply security patch from IBM (see advisory)
Vendor Advisory: https://www.ibm.com/support/pages/node/6605431
Restart Required: Yes
Instructions:
1. Download patch from IBM Fix Central. 2. Backup system. 3. Apply patch following IBM instructions. 4. Restart QRadar services.
🔧 Temporary Workarounds
Network Segmentation
allIsolate QRadar components in trusted network segments to limit attack surface.
Certificate Validation Enforcement
linuxConfigure QRadar to enforce strict certificate validation for all inter-host communications.
🧯 If You Can't Patch
- Implement strict network segmentation between QRadar components
- Monitor network traffic for unusual certificate validation failures
🔍 How to Verify
Check if Vulnerable:
Check QRadar version via Admin > System & License Management > About. If version is 7.3, 7.4, or 7.5 without latest patches, system is vulnerable.
Check Version:
ssh admin@qradar-host 'cat /opt/qradar/VERSION'
Verify Fix Applied:
Verify patch installation via Admin > System & License Management > Installed Updates. Check for certificate validation improvements in inter-host communications.
📡 Detection & Monitoring
Log Indicators:
- Certificate validation failures in QRadar logs
- Unexpected certificate changes in communications
Network Indicators:
- Unencrypted or improperly authenticated traffic between QRadar hosts
- Man-in-the-middle attack patterns
SIEM Query:
source="qradar" AND ("certificate validation" OR "SSL error" OR "TLS error")