CVE-2025-0975

8.8 HIGH

📋 TL;DR

CVE-2025-0975 is an improper input validation vulnerability in IBM MQ console that allows authenticated users to execute arbitrary code by exploiting escape character handling. This affects IBM MQ 9.3 and 9.4 Long Term Support (LTS) and Continuous Delivery (CD) versions. Attackers with valid console credentials can potentially gain full control of affected systems.

💻 Affected Systems

Products:
  • IBM MQ
Versions: 9.3 LTS, 9.3 CD, 9.4 LTS, 9.4 CD
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the IBM MQ console interface. Console must be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains remote code execution with SYSTEM/root privileges, leading to complete compromise of the IBM MQ server, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Authenticated malicious insider or compromised account executes code with IBM MQ service account privileges, allowing data access, configuration modification, and potential privilege escalation.

🟢

If Mitigated

With proper network segmentation, least privilege access, and monitoring, impact is limited to the IBM MQ console service account scope with immediate detection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the console. Attack complexity is medium due to need for specific input manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM MQ 9.3.0.22 or 9.4.0.4 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7183467

Restart Required: No

Instructions:

1. Download appropriate fix pack from IBM Fix Central. 2. Apply fix using IBM Installation Manager or native package manager. 3. Verify installation completes successfully. 4. No restart required for console component.

🔧 Temporary Workarounds

Restrict Console Access

all

Limit console access to trusted networks and users only

Configure firewall rules to restrict access to IBM MQ console port (typically 1414 or admin port)

Disable Console if Unused

all

Disable IBM MQ console interface if not required

setmqaut -m <QMGR> -t qmgr -p <user> +connect
ALTER QMGR CONSOLE(DISABLED)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IBM MQ console from untrusted networks
  • Enforce least privilege access controls and multi-factor authentication for console users

🔍 How to Verify

Check if Vulnerable:

Check IBM MQ version: dspmqver. If version is 9.3.x < 9.3.0.22 or 9.4.x < 9.4.0.4, system is vulnerable.

Check Version:

dspmqver

Verify Fix Applied:

Run dspmqver and confirm version is 9.3.0.22+ or 9.4.0.4+. Test console functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual console access patterns
  • Failed authentication attempts followed by successful login
  • Console commands with unusual escape sequences

Network Indicators:

  • Unexpected outbound connections from IBM MQ server
  • Traffic to console port from unauthorized sources

SIEM Query:

source="ibm_mq.log" AND (event="console_access" AND user!="expected_users") OR (message="escape_sequence" OR message="input_validation")

🔗 References

📤 Share & Export