The company released patches on June 3, 2025, addressing five distinct Common Vulnerabilities and Exposures (CVEs) that affect enterprise security infrastructure used by organizations worldwide.
The most severe vulnerability, identified as CVE-2025-25022, carries a CVSS base score of 9.6 out of 10, indicating critical risk severity.
This flaw enables unauthenticated attackers within the network environment to obtain highly sensitive information stored in configuration files, potentially compromising entire security infrastructures.
The vulnerability stems from passwords being stored in configuration files, a dangerous practice that violates fundamental security principles.
Additional vulnerabilities compound the security risks facing QRadar deployments. CVE-2025-25019, with a CVSS score of 4.8, allows session hijacking where the system fails to properly invalidate user sessions after logout, enabling unauthorized user impersonation.
Meanwhile, CVE-2025-25021 presents a code injection vulnerability scoring 7.2, permitting privileged users to execute malicious code through improper script generation in case management functions.
Two additional vulnerabilities round out the security bulletin.
CVE-2025-1334 allows sensitive information to persist in web browser caches, making it accessible to other system users, while CVE-2025-25020 enables authenticated users to trigger denial-of-service conditions through inadequate API input validation.
The vulnerabilities affect IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0 and QRadar Suite Software versions 1.10.12.0 through 1.11.2.0.
These platforms serve as cornerstone security information and event management (SIEM) solutions for enterprises, making the vulnerabilities particularly concerning for organizations relying on these systems for cybersecurity monitoring and incident response.
The combination of vulnerabilities creates multiple attack vectors that sophisticated threat actors could chain together for maximum impact.
An unauthenticated attacker could potentially gain access to configuration files containing sensitive credentials, use those credentials to escalate privileges, and then exploit code injection vulnerabilities to establish persistent access or execute arbitrary commands on critical security infrastructure.
The discovery of these vulnerabilities by IBM’s own Security Ethical Hacking Team, including researchers John Zuccato, Rodney Ryan, Chris Shepherd, Vince Dragnea, Ben Goodspeed, and Dawid Bak, demonstrates the importance of proactive security testing even within enterprise-grade security products.
IBM strongly recommends immediate system updates to address these critical vulnerabilities.
Organizations must upgrade to at least version 1.11.3.0 of affected products to eliminate the security risks.
The company has published comprehensive upgrade documentation and installation guides to facilitate rapid deployment of security patches.
Notably, IBM has identified no effective workarounds or mitigations for these vulnerabilities, making patching the only viable protection strategy.
Organizations unable to immediately upgrade should consider implementing additional network segmentation and access controls to limit potential exposure until patches can be applied.
The timing of this disclosure emphasizes the evolving threat landscape facing enterprise security infrastructure, where even specialized security platforms require continuous vulnerability assessment and rapid patch deployment to maintain organizational protection.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Potential Attacks appeared first on Cyber Security News.
A new weekend has arrived, and today, you can save big on the 4K Movies,…
Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…
Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…
Game of Thrones alum Charles Dance has reportedly entered talks to join The Batman Part…
Tension: We crave sustainable food innovation yet recoil from eating anything that didn’t come from…
Tension: We perform intimacy online while starving for genuine connection offline. Noise: The algorithm rewards…
This website uses cookies.