CVE-2025-1334

4.0 MEDIUM

📋 TL;DR

This vulnerability in IBM QRadar Suite and Cloud Pak for Security allows local users to read web pages stored locally by other users on the same system. It affects organizations running vulnerable versions of these IBM security products, potentially exposing sensitive configuration or operational data.

💻 Affected Systems

Products:
  • IBM QRadar Suite Software
  • IBM Cloud Pak for Security
Versions: QRadar Suite 1.10.12.0 through 1.11.2.0; Cloud Pak for Security 1.10.0.0 through 1.10.11.0
Operating Systems: Linux (typically RHEL/CentOS for IBM deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multi-user installations where multiple users have local access to the same system running these IBM products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious local user could access sensitive web pages containing configuration details, credentials, or operational data stored by other users, leading to privilege escalation or data exposure.

🟠

Likely Case

Accidental information leakage where one legitimate user's locally stored web pages become accessible to another user on the same system, potentially exposing non-critical operational data.

🟢

If Mitigated

With proper access controls and user separation, impact is minimal as only non-sensitive cached web content might be accessible.

🌐 Internet-Facing: LOW - This is a local file access vulnerability requiring local system access.
🏢 Internal Only: MEDIUM - Requires local user access but could expose sensitive information within multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access to the system. No authentication bypass needed beyond having a local account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QRadar Suite 1.11.2.1 or later; Cloud Pak for Security 1.10.11.1 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7235432

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and apply the latest patch from IBM Fix Central. 3. Restart the affected services. 4. Verify the patch applied successfully.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit local user accounts to only necessary administrative users

# Review and remove unnecessary local users
cat /etc/passwd | grep -E '^(qradar|ibm)'
# Use sudo policies to restrict access
visudo

Implement file permission hardening

linux

Tighten permissions on web cache directories

# Set restrictive permissions on web cache directories
find /opt/ibm/ -name '*cache*' -type d -exec chmod 700 {} \;
find /var/cache/ -name '*ibm*' -type d -exec chmod 700 {} \;

🧯 If You Can't Patch

  • Implement strict user access controls to limit local user accounts
  • Monitor for unusual file access patterns in system logs

🔍 How to Verify

Check if Vulnerable:

Check installed version: For QRadar: cat /opt/qradar/version.txt; For Cloud Pak: ibmcloud pak list | grep security

Check Version:

QRadar: cat /opt/qradar/version.txt; Cloud Pak: ibmcloud pak list | grep -A2 security

Verify Fix Applied:

Verify version is patched: QRadar Suite >=1.11.2.1 or Cloud Pak for Security >=1.10.11.1

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in /opt/ibm/ directories
  • Multiple user accounts accessing same web cache files

Network Indicators:

  • N/A - local file access only

SIEM Query:

source="*syslog*" AND ("Permission denied" OR "access denied") AND path="*/opt/ibm/*"

🔗 References

📤 Share & Export