CVE-2023-35006: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Security QRadar EDR
IBM Security QRadar EDR 3.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI Analysis
Technical Summary
CVE-2023-35006 is a medium-severity vulnerability identified in IBM Security QRadar Endpoint Detection and Response (EDR) version 3.12. The vulnerability is classified under CWE-80, which pertains to improper neutralization of script-related HTML tags in a web page, commonly known as a basic Cross-Site Scripting (XSS) flaw. This vulnerability allows a remote attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to inject malicious HTML code into the QRadar EDR web interface. When a victim views the injected content, the malicious script executes within the security context of the hosting site, potentially leading to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 base score is 5.4, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability poses a risk because QRadar EDR is a critical security monitoring tool used to detect and respond to threats, and exploitation could undermine the integrity and trustworthiness of security alerts and data presented to analysts.
Potential Impact
For European organizations, the impact of this vulnerability could be significant due to the widespread use of IBM QRadar EDR in enterprise security environments. Successful exploitation could allow attackers to execute malicious scripts in the context of the QRadar web interface, potentially leading to theft of session tokens, unauthorized actions within the security platform, or manipulation of security data. This could degrade the effectiveness of security monitoring and incident response, increasing the risk of undetected breaches or delayed responses. Given the critical role of QRadar EDR in protecting sensitive data and infrastructure, exploitation could indirectly compromise confidentiality and integrity of organizational assets. Additionally, regulatory frameworks such as GDPR emphasize the protection of personal data and security of processing systems; a compromised security platform could lead to compliance violations and reputational damage.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate application of any available patches or updates from IBM once released, as no patch links are currently provided. 2) Implement strict input validation and output encoding on all user-controllable inputs within the QRadar EDR interface to prevent injection of malicious HTML or scripts. 3) Restrict access to the QRadar EDR web interface to trusted networks and users, employing network segmentation and VPNs to reduce exposure. 4) Enable multi-factor authentication (MFA) for all users accessing the platform to mitigate the risk of session hijacking. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate users to be cautious of unexpected or suspicious content within the QRadar interface, as user interaction is required for exploitation. 7) Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this vulnerability. These measures, combined with timely patching, will reduce the risk of successful exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2023-35006: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Security QRadar EDR
Description
IBM Security QRadar EDR 3.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI-Powered Analysis
Technical Analysis
CVE-2023-35006 is a medium-severity vulnerability identified in IBM Security QRadar Endpoint Detection and Response (EDR) version 3.12. The vulnerability is classified under CWE-80, which pertains to improper neutralization of script-related HTML tags in a web page, commonly known as a basic Cross-Site Scripting (XSS) flaw. This vulnerability allows a remote attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to inject malicious HTML code into the QRadar EDR web interface. When a victim views the injected content, the malicious script executes within the security context of the hosting site, potentially leading to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 base score is 5.4, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability poses a risk because QRadar EDR is a critical security monitoring tool used to detect and respond to threats, and exploitation could undermine the integrity and trustworthiness of security alerts and data presented to analysts.
Potential Impact
For European organizations, the impact of this vulnerability could be significant due to the widespread use of IBM QRadar EDR in enterprise security environments. Successful exploitation could allow attackers to execute malicious scripts in the context of the QRadar web interface, potentially leading to theft of session tokens, unauthorized actions within the security platform, or manipulation of security data. This could degrade the effectiveness of security monitoring and incident response, increasing the risk of undetected breaches or delayed responses. Given the critical role of QRadar EDR in protecting sensitive data and infrastructure, exploitation could indirectly compromise confidentiality and integrity of organizational assets. Additionally, regulatory frameworks such as GDPR emphasize the protection of personal data and security of processing systems; a compromised security platform could lead to compliance violations and reputational damage.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate application of any available patches or updates from IBM once released, as no patch links are currently provided. 2) Implement strict input validation and output encoding on all user-controllable inputs within the QRadar EDR interface to prevent injection of malicious HTML or scripts. 3) Restrict access to the QRadar EDR web interface to trusted networks and users, employing network segmentation and VPNs to reduce exposure. 4) Enable multi-factor authentication (MFA) for all users accessing the platform to mitigate the risk of session hijacking. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate users to be cautious of unexpected or suspicious content within the QRadar interface, as user interaction is required for exploitation. 7) Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this vulnerability. These measures, combined with timely patching, will reduce the risk of successful exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2023-06-11T20:38:02.324Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb5e4
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 2:10:49 PM
Last updated: 8/5/2025, 12:52:17 PM
Views: 10
Related Threats
CVE-2025-8533: CWE-863 Incorrect Authorization in Flexibits Fantastical
MediumCVE-2025-35970: Use of weak credentials in SEIKO EPSON Multiple EPSON product
HighCVE-2025-29866: CWE-73: External Control of File Name or Path in TAGFREE X-Free Uploader
HighCVE-2025-32094: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai AkamaiGhost
MediumCVE-2025-8583: Inappropriate implementation in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.