CVE-2025-36351

4.3 MEDIUM

📋 TL;DR

This vulnerability in IBM License Metric Tool allows authenticated users to bypass access controls in the REST API interface, enabling unauthorized actions. It affects organizations running IBM License Metric Tool versions 9.2.0 through 9.2.40. The issue stems from improper access control (CWE-284) in the API implementation.

💻 Affected Systems

Products:
  • IBM License Metric Tool
Versions: 9.2.0 through 9.2.40
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could perform administrative actions, modify license data, or access sensitive system information beyond their authorized permissions.

🟠

Likely Case

Authenticated users could view or modify license metrics, configuration data, or perform actions they shouldn't have access to, potentially affecting license compliance reporting.

🟢

If Mitigated

With proper network segmentation and strict access controls, the impact is limited to authorized users within the administrative network segment.

🌐 Internet-Facing: LOW - This requires authenticated access, and IBM License Metric Tool is typically deployed internally for license management.
🏢 Internal Only: MEDIUM - While it requires authentication, internal users with legitimate access could exploit this to exceed their authorized permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the REST API endpoints. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.41 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7246534

Restart Required: No

Instructions:

1. Download IBM License Metric Tool version 9.2.41 or later from IBM Fix Central. 2. Follow IBM's upgrade documentation for your specific deployment. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict API Access

all

Implement network-level restrictions to limit access to the REST API interface to only authorized administrative systems.

Enhanced Monitoring

all

Implement detailed logging and monitoring of all REST API access attempts and administrative actions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the IBM License Metric Tool from general user networks
  • Apply principle of least privilege to all user accounts with access to the system

🔍 How to Verify

Check if Vulnerable:

Check the IBM License Metric Tool version via the web interface or by examining installation files. Versions 9.2.0 through 9.2.40 are vulnerable.

Check Version:

Check the version in the web interface at https://[server]:[port]/ibm/console or examine the installation directory for version files.

Verify Fix Applied:

After upgrading, verify the version shows 9.2.41 or later in the web interface or about dialog.

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API access patterns
  • Users performing actions outside their normal role
  • Failed access control checks in application logs

Network Indicators:

  • Unusual API calls to administrative endpoints
  • Traffic to REST API from unauthorized IP addresses

SIEM Query:

source="ibm_license_tool" AND (event_type="api_access" AND user_role!="admin") OR (event_type="access_denied")

🔗 References

📤 Share & Export