CVE-2025-25022

9.6 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated users to access sensitive configuration files in IBM QRadar Suite and IBM Cloud Pak for Security deployments. Attackers could obtain credentials, API keys, and other critical security information. Organizations running affected versions of these security platforms are at risk.

💻 Affected Systems

Products:
  • IBM QRadar Suite Software
  • IBM Cloud Pak for Security
Versions: IBM QRadar Suite 1.10.12.0 through 1.11.2.0; IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the security platform, credential theft leading to lateral movement across the network, and exposure of sensitive organizational data.

🟠

Likely Case

Attackers steal credentials and API keys from configuration files, enabling unauthorized access to security systems and potentially other connected systems.

🟢

If Mitigated

Limited exposure if proper network segmentation and access controls prevent unauthenticated users from reaching vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access to configuration files suggests simple HTTP requests could retrieve sensitive data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM QRadar Suite 1.11.3.0 or later; IBM Cloud Pak for Security 1.10.12.0 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7235432

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Apply the latest security patch from IBM. 3. Restart affected services. 4. Verify patch installation and functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to vulnerable interfaces using firewalls or network security groups.

Authentication Enforcement

linux

Configure web server or application to require authentication for all endpoints.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and limit access to authorized IP addresses only.
  • Implement additional monitoring and alerting for unauthorized access attempts to configuration endpoints.

🔍 How to Verify

Check if Vulnerable:

Check current version against affected ranges: IBM QRadar Suite 1.10.12.0-1.11.2.0 or IBM Cloud Pak for Security 1.10.0.0-1.10.11.0.

Check Version:

Consult IBM documentation for version check commands specific to your deployment.

Verify Fix Applied:

Confirm version is updated to IBM QRadar Suite 1.11.3.0+ or IBM Cloud Pak for Security 1.10.12.0+.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to configuration file paths
  • Unusual file access patterns from unauthenticated users

Network Indicators:

  • HTTP requests to configuration endpoints without authentication headers

SIEM Query:

source="qradar" AND (url="*/config/*" OR url="*/configuration/*") AND user="-"

🔗 References

📤 Share & Export