Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25051: CWE-613 Insufficient Session Expiration in IBM Jazz Reporting Service

0
Medium
VulnerabilityCVE-2024-25051cvecve-2024-25051cwe-613
Published: Wed Apr 02 2025 (04/02/2025, 14:57:12 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Jazz Reporting Service

Description

IBM Jazz Reporting Service 7.0.2 and 7.0.3 does not invalidate session after logout which could allow an authenticated privileged user to impersonate another user on the system.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:42:49 UTC

Technical Analysis

CVE-2024-25051 is a session management vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting IBM Jazz Reporting Service versions 7.0.2 and 7.0.3. The flaw arises because the application fails to invalidate user sessions upon logout, leaving session tokens active and reusable. This allows an authenticated user with elevated privileges to impersonate other users by reusing these stale session tokens, potentially gaining unauthorized access to sensitive data or performing unauthorized actions. The vulnerability requires the attacker to already have privileged authenticated access, which limits exploitation scope but increases risk within trusted user groups. The CVSS 3.1 score of 6.6 reflects a medium severity with network attack vector, high complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where session management is critical. IBM has not yet published patches, so organizations must monitor for updates and consider interim controls. This vulnerability highlights the importance of proper session lifecycle management to prevent session fixation and hijacking attacks in enterprise applications.

Potential Impact

The vulnerability allows privileged authenticated users to impersonate other users by reusing sessions that should have been invalidated at logout. This can lead to unauthorized access to sensitive information, unauthorized actions performed under another user's identity, and potential disruption of service integrity and availability. In environments where IBM Jazz Reporting Service is used for critical reporting and decision-making, such impersonation could compromise data confidentiality and integrity, leading to compliance violations, data breaches, and operational disruptions. Since the attacker must have privileged access, the threat is mainly internal or from compromised privileged accounts, increasing insider threat risks. The inability to properly terminate sessions also weakens overall security posture and could facilitate lateral movement within networks. Organizations relying on this service for governance, risk, and compliance reporting may face significant operational and reputational damage if exploited.

Mitigation Recommendations

Organizations should immediately review and restrict privileged user access to IBM Jazz Reporting Service to minimize risk exposure. Implement strict session management policies, including manual session invalidation where possible, and monitor session activity logs for anomalies indicative of session reuse or impersonation. Employ multi-factor authentication (MFA) for privileged accounts to reduce the risk of account compromise. Network segmentation and least privilege principles should be enforced to limit the impact of any compromised sessions. IBM customers should closely monitor IBM security advisories for patches or updates addressing this vulnerability and apply them promptly once released. In the interim, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious session reuse patterns. Conduct regular security audits and penetration testing focused on session management controls within the affected environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-02-03T14:49:33.094Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1b885912abc71d0a0c1

Added to database: 2/26/2026, 7:40:40 PM

Last enriched: 2/26/2026, 7:42:49 PM

Last updated: 2/26/2026, 10:48:08 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses