Skip to main content

CVE-2025-0163: CWE-204 Response Discrepancy Information Exposure in IBM Security Verify Access

Medium
VulnerabilityCVE-2025-0163cvecve-2025-0163cwe-204
Published: Wed Jun 11 2025 (06/11/2025, 14:20:28 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Verify Access

Description

IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts.

AI-Powered Analysis

AILast updated: 07/12/2025, 07:46:16 UTC

Technical Analysis

CVE-2025-0163 is a medium-severity vulnerability affecting IBM Security Verify Access Appliance and Docker versions 10.0 through 10.0.8. The vulnerability is categorized under CWE-204, which relates to response discrepancy information exposure. Specifically, this flaw allows a remote attacker to enumerate valid usernames by observing differences in system responses when querying disabled accounts versus enabled ones. Because the vulnerability does not require authentication or user interaction and can be exploited remotely over the network, an attacker can systematically probe the system to identify valid user accounts. This information disclosure does not directly impact the integrity or availability of the system but compromises confidentiality by revealing valid usernames, which can be leveraged in subsequent attacks such as password guessing, phishing, or brute force attempts. The CVSS v3.1 score of 5.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). No known exploits are reported in the wild as of the publication date, and no patches are currently linked, indicating that mitigation may require vendor updates or configuration changes once available.

Potential Impact

For European organizations using IBM Security Verify Access versions 10.0 to 10.0.8, this vulnerability poses a risk of user enumeration, which can facilitate targeted attacks such as credential stuffing, phishing campaigns, or social engineering. The exposure of valid usernames undermines the confidentiality of user identity information and can increase the attack surface for identity-based attacks. Organizations relying on this product for access management and authentication may see an increased risk of account compromise attempts. While the vulnerability does not directly allow unauthorized access or system disruption, the information gained can be a stepping stone for more severe attacks. Given the critical role of identity and access management in securing enterprise environments, this vulnerability could indirectly affect compliance with data protection regulations such as GDPR if user data is compromised through subsequent attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor IBM’s security advisories closely for patches addressing CVE-2025-0163 and apply updates promptly once available. 2) Temporarily restrict or monitor access to the IBM Security Verify Access interfaces exposed to untrusted networks to reduce the attack surface. 3) Implement rate limiting and anomaly detection on authentication and user enumeration endpoints to detect and block automated probing attempts. 4) Review and harden account lockout policies and multi-factor authentication (MFA) configurations to mitigate the impact of username enumeration by making credential-based attacks more difficult. 5) Conduct internal audits and penetration testing focused on user enumeration vectors to identify and remediate similar issues in custom integrations or configurations. 6) Educate security teams and users about phishing and social engineering risks that could be amplified by username disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-12-31T19:09:14.912Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849950223110031d41023cb

Added to database: 6/11/2025, 2:38:58 PM

Last enriched: 7/12/2025, 7:46:16 AM

Last updated: 8/9/2025, 2:35:48 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats