Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

Paper page – HOComp: Interaction-Aware Human-Object Composition

DeepSeek Predicts DOGE, BONK And WIF Prices For End Of 2025

Jensen on tour, Elon on the hunt

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • OpenAI (GPT-4 / GPT-4o)
    • Anthropic (Claude 3)
    • Google DeepMind (Gemini)
    • Meta (LLaMA)
    • Cohere (Command R)
    • Amazon (Titan)
    • IBM (Watsonx)
    • Inflection AI (Pi)
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • AI Experts
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • The TechLead
    • Matt Wolfe AI
    • Andrew Ng
    • OpenAI
    • Expert Blogs
      • François Chollet
      • Gary Marcus
      • IBM
      • Jack Clark
      • Jeremy Howard
      • Melanie Mitchell
      • Andrew Ng
      • Andrej Karpathy
      • Sebastian Ruder
      • Rachel Thomas
      • IBM
  • AI Tools
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
  • AI Policy
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
  • Industry AI
    • Finance AI
    • Healthcare AI
    • Education AI
    • Energy AI
    • Legal AI
LinkedIn Instagram YouTube Threads X (Twitter)
Advanced AI News
IBM

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers

By Advanced AI EditorJune 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


IBM has issued a security bulletin highlighting multiple vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms.

The flaws, which range from medium to critical severity, could enable attackers to compromise sensitive data, execute arbitrary code, or disrupt service operations.

Security experts and IBM strongly recommend that all affected organizations upgrade to the latest version without delay.

– Advertisement –
Google News

Critical Flaws Uncovered:

The vulnerabilities identified affect QRadar Suite Software versions 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0.

Each vulnerability is cataloged with a CVE identifier and scored using the Common Vulnerability Scoring System (CVSS v3.1), which quantifies the risk based on exploitability and impact.

Key vulnerabilities include:

CVE-2025-25022 (CVSS 9.6, Critical): This vulnerability allows unauthenticated users to access highly sensitive information, such as passwords, stored in configuration files. It is classified under CWE-260: Password in Configuration File, and could facilitate privilege escalation or broader system compromise.

CVE-2025-25021 (CVSS 7.2, High): Improper code generation in case management scripts enables privileged users to execute arbitrary code. This is a classic code injection flaw (CWE-94), potentially allowing attackers to run malicious commands within administrative contexts.

CVE-2025-25019 (CVSS 4.8, Medium): The software fails to invalidate sessions after logout (CWE-613), opening the door to session hijacking and user impersonation.

CVE-2025-1334 (CVSS 4.0, Medium): Web pages are stored locally and may be read by other users on the same system, risking sensitive data exposure in shared environments (CWE-525).

CVE-2025-25020 (CVSS 6.5, Medium): Inadequate API input validation (CWE-1287) allows authenticated users to cause denial of service (DoS) by submitting malformed data, potentially crashing critical services.

Technical codes and terms:

CWE (Common Weakness Enumeration): Classification of software weaknesses such as CWE-260 (Password in Configuration File) and CWE-94 (Code Injection).

CVSS (Common Vulnerability Scoring System): Industry-standard method for rating IT vulnerabilities, with scores from 0 (none) to 10 (critical).

Session Hijacking: Exploiting session management flaws to impersonate users.

Denial of Service (DoS): Disrupting the normal operation of a service, often by exploiting input validation weaknesses.

Risk Factor Table:

CVE IDDescriptionCVSS ScoreRisk LevelCVE-2025-25019Session not invalidated after logout, impersonation4.8MediumCVE-2025-25022Unauthenticated user can access sensitive config files9.6CriticalCVE-2025-25021Privileged user code execution via script management7.2HighCVE-2025-1334Local web cache readable by other users4.0MediumCVE-2025-25020API input flaw allows denial of service6.5Medium

Immediate Remediation and Best Practices

IBM urges all customers to upgrade to QRadar Suite Software version 1.11.3.0 or later, which addresses all five vulnerabilities.

No workarounds or mitigations are available for these issues, making prompt patching essential.

Detailed upgrade instructions are provided in IBM’s official documentation.

Best practices include:

Regularly monitor and apply security updates.

Review session management and input validation mechanisms.

Limit access to sensitive configuration files and monitor for unauthorized access.

IBM’s Security Ethical Hacking Team, including John Zuccato and others, is credited for identifying these flaws, underscoring the importance of continuous security research and responsible disclosure.

These vulnerabilities highlight the ongoing risks in complex security platforms.

Organizations using IBM QRadar Suite Software or Cloud Pak for Security should act immediately to mitigate exposure, as exploitation could lead to severe data breaches or operational disruptions.

To Upgrade Your Cybersecurity Skills, Take Diamond Membership With 150+ Practical Cybersecurity Courses Online – Enroll Here



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLegal Innovators California is Next Week! – Artificial Lawyer
Next Article Return of Doubao: Chinese netizens rejoice at return of fugitive capybara
Advanced AI Editor
  • Website

Related Posts

Amazon follows IBM and Microsoft, shuts China AI lab that generated nearly $1 billion in sales

July 23, 2025

Will Modest Consulting Revenue Growth Aid IBM’s Q2 Earnings? – July 22, 2025

July 22, 2025

IBM and Researchers Are Now Closer to Practical Quantum Computers

July 21, 2025
Leave A Reply

Latest Posts

Barnes Foundation Online Learning Platform Expands to Penn Museum

Archaeologists Identify 5,500-Year-Old Megalithic Tombs in Poland

Phillips to Debut ‘First-of-its Kind’ Priority Bidding Structure

3,800-Year-Old Warrior’s Tomb Unearthed in Azerbaijan

Latest Posts

Paper page – HOComp: Interaction-Aware Human-Object Composition

July 23, 2025

DeepSeek Predicts DOGE, BONK And WIF Prices For End Of 2025

July 23, 2025

Jensen on tour, Elon on the hunt

July 23, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Paper page – HOComp: Interaction-Aware Human-Object Composition
  • DeepSeek Predicts DOGE, BONK And WIF Prices For End Of 2025
  • Jensen on tour, Elon on the hunt
  • Microsoft snapped up dozens of Google DeepMind staffers in recent months: Report | Technology News
  • OpenAI CEO Sam Altman warns of an AI ‘fraud crisis’ – The Mercury News

Recent Comments

  1. 1win app download on Former Tesla AI czar Andrej Karpathy coins ‘vibe coding’: Here’s what it means
  2. 📃 ✉️ Pending Deposit: 1.8 BTC from new sender. Review? > https://graph.org/REDEEM-BTC-07-23?hs=60194a6753699dfb5804798d5843ffd0& 📃 on This Neural Network Optimizes Itself | Two Minute Papers #212
  3. 📉 📩 Pending Deposit - 1.0 BTC from unknown sender. Review? => https://graph.org/REDEEM-BTC-07-23?hs=16ed4f83e039fc01f975372e66ec05d7& 📉 on OpenAI seeks to make its upcoming ‘open’ AI model best-in-class
  4. 📊 📩 Pending Transfer: 1.8 BTC from unknown sender. Approve? >> https://graph.org/REDEEM-BTC-07-23?hs=8f64f5846f6d90e5a1ebb4bba272bbea& 📊 on Nvidia’s GB200 NVL72 Supercomputer Achieves 2.7× Faster Inference on DeepSeek V2
  5. 📅 ✉️ New Deposit: 1.8 BTC from new sender. Approve? > https://graph.org/REDEEM-BTC-07-23?hs=5719fe560af3b8c36c0a0976ea7a6f6b& 📅 on Meta, Booz Allen develop ‘Space Llama’ AI system for the International Space Station

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

LinkedIn Instagram YouTube Threads X (Twitter)
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.