CVE-2025-2140

5.7 MEDIUM

📋 TL;DR

This vulnerability in IBM Engineering Requirements Management Doors Next allows authenticated users to spoof email sender identities due to improper source data verification. It affects versions 7.0.2, 7.0.3, and 7.1. Attackers could send emails appearing to come from trusted sources within the organization.

💻 Affected Systems

Products:
  • IBM Engineering Requirements Management Doors Next
Versions: 7.0.2, 7.0.3, 7.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Doors Next application

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could impersonate system administrators or trusted users to send phishing emails, potentially leading to credential theft, malware distribution, or unauthorized access to sensitive requirements data.

🟠

Likely Case

Attackers could send spoofed emails to trick users into revealing information or performing unauthorized actions, potentially compromising project requirements integrity.

🟢

If Mitigated

With proper email filtering and user awareness training, the impact is reduced to minor confusion about email origins with limited security consequences.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the email functionality within Doors Next

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest fix pack for your version as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7247716

Restart Required: No

Instructions:

1. Review IBM advisory for specific fix details. 2. Apply the recommended fix pack for your version. 3. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Email Filtering Enhancement

all

Implement additional email filtering rules to detect and block spoofed emails from the Doors Next system

User Awareness Training

all

Train users to verify email sender authenticity and report suspicious emails

🧯 If You Can't Patch

  • Implement strict email filtering rules for all emails originating from the Doors Next system
  • Monitor email logs for unusual sending patterns and implement alerting for potential spoofing attempts

🔍 How to Verify

Check if Vulnerable:

Check your Doors Next version against affected versions: 7.0.2, 7.0.3, or 7.1

Check Version:

Check version through Doors Next administration interface or consult IBM documentation

Verify Fix Applied:

Verify you have applied the latest fix pack and test email functionality to ensure proper sender verification

📡 Detection & Monitoring

Log Indicators:

  • Unusual email sending patterns from Doors Next users
  • Multiple emails with similar content from different apparent senders

Network Indicators:

  • Emails from Doors Next with mismatched sender headers
  • Unusual SMTP traffic patterns from Doors Next servers

SIEM Query:

source="doors_next" AND event_type="email_sent" | stats count by sender_email | where count > threshold

🔗 References

📤 Share & Export