Skip to main content

CVE-2023-33860: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Security QRadar EDR

Medium
VulnerabilityCVE-2023-33860cvecve-2023-33860cwe-614
Published: Wed Jul 10 2024 (07/10/2024, 15:28:42 UTC)
Source: CVE
Vendor/Project: IBM
Product: Security QRadar EDR

Description

IBM Security QRadar EDR 3.12 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:10:34 UTC

Technical Analysis

CVE-2023-33860 is a medium-severity vulnerability affecting IBM Security QRadar EDR version 3.12. The issue arises because the product does not set the 'Secure' attribute on authorization tokens or session cookies. The 'Secure' attribute is a flag that instructs browsers to only send cookies over HTTPS connections, preventing their exposure over unencrypted HTTP traffic. Without this attribute, session cookies can be transmitted over insecure HTTP connections if a user follows a crafted HTTP link or visits a malicious site that triggers such a request. An attacker who can intercept this HTTP traffic (e.g., via a man-in-the-middle attack on an unsecured network) can capture these cookies and potentially hijack user sessions or gain unauthorized access. This vulnerability is classified under CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute), which highlights the risk of cookie exposure due to improper cookie attribute configuration. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality only, without affecting integrity or availability. No known exploits are currently reported in the wild, but the vulnerability presents a realistic risk in environments where users might be tricked into accessing HTTP links or where network traffic can be intercepted. Since QRadar EDR is a security monitoring and incident detection platform, compromising session cookies could allow attackers to access sensitive security data or manipulate detection capabilities, undermining organizational security posture.

Potential Impact

For European organizations using IBM Security QRadar EDR 3.12, this vulnerability could lead to unauthorized access to security monitoring consoles if attackers successfully capture session cookies. This exposure risks confidentiality of sensitive security event data, potentially allowing attackers to evade detection or manipulate incident response processes. The impact is particularly significant for organizations in critical infrastructure sectors, finance, government, and large enterprises that rely on QRadar EDR for threat detection and response. Given the medium severity and the requirement for interception of HTTP traffic, the risk is higher in environments where users access management consoles over insecure networks or where phishing/social engineering could direct users to HTTP links. The vulnerability does not directly affect system integrity or availability but compromises the confidentiality of session tokens, which can have cascading effects on security operations. European organizations with strict data protection regulations (e.g., GDPR) must consider the risk of unauthorized access to security logs and incident data as a compliance concern.

Mitigation Recommendations

1. Immediate mitigation involves ensuring that all access to IBM Security QRadar EDR consoles and related web interfaces is strictly over HTTPS, with HTTP access disabled or redirected to HTTPS to prevent cookie transmission over insecure channels. 2. IBM or administrators should apply patches or configuration updates that explicitly set the 'Secure' attribute on all session and authorization cookies to enforce secure transmission. 3. Network-level protections such as enforcing HTTPS via web application firewalls (WAFs), secure reverse proxies, or SSL/TLS termination points can help mitigate risks. 4. User education to avoid clicking on HTTP links related to QRadar EDR and to verify URLs before access can reduce phishing risks. 5. Implement network segmentation and VPN usage for accessing management consoles to reduce exposure to man-in-the-middle attacks. 6. Monitor logs for suspicious session activity that could indicate session hijacking attempts. 7. Regularly review and update security policies to enforce secure cookie handling and session management best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2023-05-23T00:32:05.086Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5e2

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 2:10:34 PM

Last updated: 8/14/2025, 4:40:12 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats