CVE-2025-36222

8.7 HIGH

📋 TL;DR

This vulnerability exposes AMQStreams without client authentication in IBM Fusion products due to insecure default configurations. Attackers could perform unauthorized actions on affected systems. Organizations running IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, or IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 are vulnerable.

💻 Affected Systems

Products:
  • IBM Fusion
  • IBM Fusion HCI
  • IBM Fusion HCI for watsonx
Versions: IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, IBM Fusion HCI for watsonx 2.8.2 through 2.10.0
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations exposing AMQStreams without proper client authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of AMQStreams infrastructure allowing data exfiltration, service disruption, or unauthorized administrative actions across the messaging system.

🟠

Likely Case

Unauthorized access to message streams leading to data leakage, message injection, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to AMQStreams endpoints but no authentication credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM Fusion 2.10.2, IBM Fusion HCI 2.10.1, IBM Fusion HCI for watsonx 2.10.1

Vendor Advisory: https://www.ibm.com/support/pages/node/7244646

Restart Required: Yes

Instructions:

1. Review IBM advisory. 2. Apply patches to affected versions. 3. Restart services. 4. Verify authentication is enabled for AMQStreams.

🔧 Temporary Workarounds

Enable AMQStreams Client Authentication

all

Configure AMQStreams to require client authentication before allowing connections.

Refer to IBM documentation for AMQStreams authentication configuration specific to your deployment

Network Segmentation

linux

Restrict network access to AMQStreams endpoints using firewalls or network policies.

iptables -A INPUT -p tcp --dport 9092 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 9092 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of AMQStreams endpoints
  • Enable and enforce client authentication for all AMQStreams connections

🔍 How to Verify

Check if Vulnerable:

Check if AMQStreams endpoints (typically port 9092) are accessible without authentication from untrusted networks.

Check Version:

Check IBM Fusion product version through administrative interface or configuration files.

Verify Fix Applied:

Test that AMQStreams connections require valid authentication credentials and unauthorized connections are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated connection attempts to AMQStreams ports
  • Failed authentication attempts from unexpected sources
  • Unusual message consumption/production patterns

Network Indicators:

  • Unencrypted or unauthenticated traffic to AMQStreams ports (typically 9092)
  • Connection attempts from unauthorized IP ranges

SIEM Query:

source_port=9092 AND (auth_failure OR no_authentication)

🔗 References

📤 Share & Export