Skip to main content

CVE-2023-35006: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Security QRadar EDR

Medium
VulnerabilityCVE-2023-35006cvecve-2023-35006cwe-80
Published: Wed Jul 10 2024 (07/10/2024, 15:23:14 UTC)
Source: CVE
Vendor/Project: IBM
Product: Security QRadar EDR

Description

IBM Security QRadar EDR 3.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:10:49 UTC

Technical Analysis

CVE-2023-35006 is a medium-severity vulnerability identified in IBM Security QRadar Endpoint Detection and Response (EDR) version 3.12. The vulnerability is classified under CWE-80, which pertains to improper neutralization of script-related HTML tags in a web page, commonly known as a basic Cross-Site Scripting (XSS) flaw. This vulnerability allows a remote attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to inject malicious HTML code into the QRadar EDR web interface. When a victim views the injected content, the malicious script executes within the security context of the hosting site, potentially leading to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 base score is 5.4, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability poses a risk because QRadar EDR is a critical security monitoring tool used to detect and respond to threats, and exploitation could undermine the integrity and trustworthiness of security alerts and data presented to analysts.

Potential Impact

For European organizations, the impact of this vulnerability could be significant due to the widespread use of IBM QRadar EDR in enterprise security environments. Successful exploitation could allow attackers to execute malicious scripts in the context of the QRadar web interface, potentially leading to theft of session tokens, unauthorized actions within the security platform, or manipulation of security data. This could degrade the effectiveness of security monitoring and incident response, increasing the risk of undetected breaches or delayed responses. Given the critical role of QRadar EDR in protecting sensitive data and infrastructure, exploitation could indirectly compromise confidentiality and integrity of organizational assets. Additionally, regulatory frameworks such as GDPR emphasize the protection of personal data and security of processing systems; a compromised security platform could lead to compliance violations and reputational damage.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate application of any available patches or updates from IBM once released, as no patch links are currently provided. 2) Implement strict input validation and output encoding on all user-controllable inputs within the QRadar EDR interface to prevent injection of malicious HTML or scripts. 3) Restrict access to the QRadar EDR web interface to trusted networks and users, employing network segmentation and VPNs to reduce exposure. 4) Enable multi-factor authentication (MFA) for all users accessing the platform to mitigate the risk of session hijacking. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate users to be cautious of unexpected or suspicious content within the QRadar interface, as user interaction is required for exploitation. 7) Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this vulnerability. These measures, combined with timely patching, will reduce the risk of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2023-06-11T20:38:02.324Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5e4

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 2:10:49 PM

Last updated: 8/5/2025, 12:52:17 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats