CVE-2025-36376
📋 TL;DR
IBM Security QRadar EDR versions 3.12 through 3.12.23 fail to properly invalidate sessions after expiration, allowing authenticated users to impersonate other users. This affects organizations using vulnerable QRadar EDR deployments where multiple users access the system.
💻 Affected Systems
- IBM Security QRadar EDR
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious insider could impersonate an administrator, gaining full system control to exfiltrate sensitive data, modify configurations, or disrupt operations.
Likely Case
An authenticated user could impersonate another user with higher privileges to access unauthorized data or perform unauthorized actions within their session scope.
If Mitigated
With proper session management controls and monitoring, impact is limited to potential unauthorized access within the authenticated user's existing session constraints.
🎯 Exploit Status
Exploitation requires an authenticated user session and knowledge of session management flaws.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.12.24 or later
Vendor Advisory: https://www.ibm.com/support/pages/node/7260390
Restart Required: Yes
Instructions:
1. Download IBM Security QRadar EDR version 3.12.24 or later from IBM Fix Central. 2. Follow IBM's upgrade documentation for your deployment type. 3. Restart QRadar EDR services after upgrade completion.
🔧 Temporary Workarounds
Enforce Session Timeout Policies
allConfigure shorter session timeout values and ensure proper session invalidation mechanisms are enforced.
🧯 If You Can't Patch
- Implement strict access controls and monitoring for user sessions
- Enforce multi-factor authentication for all administrative accounts
🔍 How to Verify
Check if Vulnerable:
Check QRadar EDR version via web interface or command line. If version is between 3.12 and 3.12.23 inclusive, system is vulnerable.
Check Version:
Check web interface About page or consult IBM documentation for version query commands specific to your deployment.
Verify Fix Applied:
Verify version is 3.12.24 or later and test session expiration behavior.
📡 Detection & Monitoring
Log Indicators:
- Multiple simultaneous sessions from same user account
- Session activity continuing beyond configured timeout periods
- Unusual privilege escalation patterns in audit logs
Network Indicators:
- Abnormal session duration patterns in authentication logs
SIEM Query:
source="qradar_edr" AND (event_type="session_activity" AND session_duration > 3600) OR (user_privilege_change WITHOUT admin_action)