Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

What’s Happening With IBM Stock?

Putting AI To Work To Stymie The Email Fraudsters And Crooks

Why Big Investors Are All Ears For Voice AI Startups

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • OpenAI (GPT-4 / GPT-4o)
    • Anthropic (Claude 3)
    • Google DeepMind (Gemini)
    • Meta (LLaMA)
    • Cohere (Command R)
    • Amazon (Titan)
    • IBM (Watsonx)
    • Inflection AI (Pi)
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • AI Experts
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • The TechLead
    • Matt Wolfe AI
    • Andrew Ng
    • OpenAI
    • Expert Blogs
      • François Chollet
      • Gary Marcus
      • IBM
      • Jack Clark
      • Jeremy Howard
      • Melanie Mitchell
      • Andrew Ng
      • Andrej Karpathy
      • Sebastian Ruder
      • Rachel Thomas
      • IBM
  • AI Tools
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
  • AI Policy
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
  • Business AI
    • Advanced AI News Features
    • Finance AI
    • Healthcare AI
    • Education AI
    • Energy AI
    • Legal AI
LinkedIn Instagram YouTube Threads X (Twitter)
Advanced AI News
IBM

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers

By Advanced AI EditorJune 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


IBM has issued a security bulletin highlighting multiple vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms.

The flaws, which range from medium to critical severity, could enable attackers to compromise sensitive data, execute arbitrary code, or disrupt service operations.

Security experts and IBM strongly recommend that all affected organizations upgrade to the latest version without delay.

– Advertisement –
Google News

Critical Flaws Uncovered:

The vulnerabilities identified affect QRadar Suite Software versions 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0.

Each vulnerability is cataloged with a CVE identifier and scored using the Common Vulnerability Scoring System (CVSS v3.1), which quantifies the risk based on exploitability and impact.

Key vulnerabilities include:

CVE-2025-25022 (CVSS 9.6, Critical): This vulnerability allows unauthenticated users to access highly sensitive information, such as passwords, stored in configuration files. It is classified under CWE-260: Password in Configuration File, and could facilitate privilege escalation or broader system compromise.

CVE-2025-25021 (CVSS 7.2, High): Improper code generation in case management scripts enables privileged users to execute arbitrary code. This is a classic code injection flaw (CWE-94), potentially allowing attackers to run malicious commands within administrative contexts.

CVE-2025-25019 (CVSS 4.8, Medium): The software fails to invalidate sessions after logout (CWE-613), opening the door to session hijacking and user impersonation.

CVE-2025-1334 (CVSS 4.0, Medium): Web pages are stored locally and may be read by other users on the same system, risking sensitive data exposure in shared environments (CWE-525).

CVE-2025-25020 (CVSS 6.5, Medium): Inadequate API input validation (CWE-1287) allows authenticated users to cause denial of service (DoS) by submitting malformed data, potentially crashing critical services.

Technical codes and terms:

CWE (Common Weakness Enumeration): Classification of software weaknesses such as CWE-260 (Password in Configuration File) and CWE-94 (Code Injection).

CVSS (Common Vulnerability Scoring System): Industry-standard method for rating IT vulnerabilities, with scores from 0 (none) to 10 (critical).

Session Hijacking: Exploiting session management flaws to impersonate users.

Denial of Service (DoS): Disrupting the normal operation of a service, often by exploiting input validation weaknesses.

Risk Factor Table:

CVE IDDescriptionCVSS ScoreRisk LevelCVE-2025-25019Session not invalidated after logout, impersonation4.8MediumCVE-2025-25022Unauthenticated user can access sensitive config files9.6CriticalCVE-2025-25021Privileged user code execution via script management7.2HighCVE-2025-1334Local web cache readable by other users4.0MediumCVE-2025-25020API input flaw allows denial of service6.5Medium

Immediate Remediation and Best Practices

IBM urges all customers to upgrade to QRadar Suite Software version 1.11.3.0 or later, which addresses all five vulnerabilities.

No workarounds or mitigations are available for these issues, making prompt patching essential.

Detailed upgrade instructions are provided in IBM’s official documentation.

Best practices include:

Regularly monitor and apply security updates.

Review session management and input validation mechanisms.

Limit access to sensitive configuration files and monitor for unauthorized access.

IBM’s Security Ethical Hacking Team, including John Zuccato and others, is credited for identifying these flaws, underscoring the importance of continuous security research and responsible disclosure.

These vulnerabilities highlight the ongoing risks in complex security platforms.

Organizations using IBM QRadar Suite Software or Cloud Pak for Security should act immediately to mitigate exposure, as exploitation could lead to severe data breaches or operational disruptions.

To Upgrade Your Cybersecurity Skills, Take Diamond Membership With 150+ Practical Cybersecurity Courses Online – Enroll Here



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLegal Innovators California is Next Week! – Artificial Lawyer
Next Article Return of Doubao: Chinese netizens rejoice at return of fugitive capybara
Advanced AI Editor
  • Website

Related Posts

Amazon, IBM, and Dell helped build China’s surveillance state brick by brick, investigation finds

September 9, 2025

IBM vs. QCOM: Which Tech Stock Deserves a Spot in Your Portfolio Now? – September 9, 2025

September 9, 2025

IBM Declines 8.6% in 3 Months: Should You Rethink the Stock? – September 8, 2025

September 8, 2025
Leave A Reply

Latest Posts

Leon Black and Leslie Wexner’s Letters to Jeffrey Epstein Released

School of Visual Arts Transfers Ownership to Nonprofit Alumni Society

Cristin Tierney Moves Gallery to Tribeca for 15th Anniversary Exhibition

Anne Imhof Reimagines Football Jerseys with Nike

Latest Posts

What’s Happening With IBM Stock?

September 10, 2025

Putting AI To Work To Stymie The Email Fraudsters And Crooks

September 10, 2025

Why Big Investors Are All Ears For Voice AI Startups

September 10, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • What’s Happening With IBM Stock?
  • Putting AI To Work To Stymie The Email Fraudsters And Crooks
  • Why Big Investors Are All Ears For Voice AI Startups
  • Tesla targets Bay Area airports as next step for Robotaxi rollout
  • AI gaming startup Born raises $15M to build ‘social’ AI companions that combat loneliness

Recent Comments

  1. goofykraken5Nalay on AI as a Service: Top AIaaS Vendors for All Types of Businesses (2025)
  2. Charleymet on Anthropic’s popular Claude Code AI tool now included in its $20/month Pro plan
  3. appandpin on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  4. RonaldHar on Anthropic’s popular Claude Code AI tool now included in its $20/month Pro plan
  5. quirkyseahorse3Nalay on Reverse Engineering The IBM PC110, One PCB At A Time

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

LinkedIn Instagram YouTube Threads X (Twitter)
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.