Skip to main content

CVE-2025-0161: CWE-94 Improper Control of Generation of Code ('Code Injection') in IBM Security Verify Access

High
VulnerabilityCVE-2025-0161cvecve-2025-0161cwe-94
Published: Thu Feb 20 2025 (02/20/2025, 16:02:37 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Verify Access

Description

IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation.

AI-Powered Analysis

AILast updated: 08/11/2025, 17:18:37 UTC

Technical Analysis

CVE-2025-0161 is a high-severity vulnerability identified in IBM Security Verify Access Appliance versions 10.0.0.0 through 10.0.0.9 and 11.0.0.0. The vulnerability stems from improper control over the generation of code, categorized under CWE-94 (Improper Control of Generation of Code, commonly known as code injection). Specifically, this flaw allows a local user with limited privileges (low-level privileges) to execute arbitrary code on the affected appliance. The vulnerability arises because the system does not adequately restrict or sanitize the code that can be generated or executed internally, enabling an attacker to inject malicious code that the appliance will run. The CVSS v3.1 base score of 7.8 reflects the significant risk posed by this vulnerability, with the vector indicating that exploitation requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature means that once exploited, an attacker could gain control over the appliance, potentially compromising authentication and access control mechanisms managed by IBM Security Verify Access. This could lead to unauthorized access to protected resources, data breaches, and disruption of identity and access management services. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations and monitor for updates from IBM.

Potential Impact

For European organizations, the impact of CVE-2025-0161 could be substantial, especially for those relying on IBM Security Verify Access for identity and access management (IAM). This appliance often serves as a critical component in securing access to enterprise applications and sensitive data. Exploitation could lead to unauthorized privilege escalation, allowing attackers to bypass authentication controls, access confidential data, and disrupt service availability. Given the appliance’s role in federated identity management and single sign-on (SSO) environments, a compromise could cascade to multiple connected systems, amplifying the breach impact. This is particularly critical for sectors with stringent regulatory requirements such as finance, healthcare, and government within Europe, where data protection laws like GDPR impose heavy penalties for data breaches. Additionally, disruption of IAM services could halt business operations, affecting productivity and trust. The local access requirement limits remote exploitation but does not eliminate risk, as insider threats or attackers who have already gained foothold in the network could leverage this vulnerability to escalate privileges and move laterally.

Mitigation Recommendations

Given the absence of official patches at the time of disclosure, European organizations should implement several specific mitigations: 1) Restrict and monitor local access to IBM Security Verify Access appliances strictly, ensuring only trusted administrators have physical or console access. 2) Employ robust network segmentation to isolate the appliance from less trusted network zones, reducing the risk of attackers gaining local access. 3) Enhance logging and monitoring on the appliance to detect unusual code execution attempts or privilege escalations promptly. 4) Use host-based intrusion detection systems (HIDS) on the appliance or its host environment to identify suspicious activities related to code injection. 5) Review and tighten internal access controls and privilege assignments to minimize the number of users with local access rights. 6) Prepare for rapid patch deployment by establishing a vulnerability management process that includes vendor communication channels to receive updates as soon as IBM releases a fix. 7) Conduct regular security audits and penetration testing focused on local access controls and code execution paths within the appliance environment. These targeted actions go beyond generic advice by focusing on controlling local access vectors and monitoring for exploitation attempts specific to code injection vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-12-31T19:09:12.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689a2234ad5a09ad00274f02

Added to database: 8/11/2025, 5:02:44 PM

Last enriched: 8/11/2025, 5:18:37 PM

Last updated: 8/11/2025, 9:04:49 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats