Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0975: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in IBM MQ

0
High
VulnerabilityCVE-2025-0975cvecve-2025-0975cwe-150
Published: Fri Feb 28 2025 (02/28/2025, 02:20:36 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: MQ

Description

IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD console could allow an authenticated user to execute code due to improper neutralization of escape characters.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:45:22 UTC

Technical Analysis

CVE-2025-0975 is a vulnerability classified under CWE-150, which involves improper neutralization of escape, meta, or control sequences within the IBM MQ console interface. IBM MQ versions 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD are affected. The flaw allows an authenticated user to inject and execute arbitrary code by exploiting insufficient sanitization of escape characters in the console input. This improper neutralization can lead to command injection or code execution, compromising the system running IBM MQ. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. IBM MQ is widely used in enterprise environments for reliable messaging and transaction processing, making this vulnerability particularly critical. Although no public exploits have been reported yet, the ease of exploitation and potential impact necessitate urgent attention. The vulnerability was publicly disclosed on February 28, 2025, with no patches listed at the time, emphasizing the need for immediate risk mitigation.

Potential Impact

The impact of CVE-2025-0975 is substantial for organizations worldwide that rely on IBM MQ for messaging and transaction processing. Successful exploitation can lead to arbitrary code execution on the IBM MQ server, potentially allowing attackers to gain unauthorized access, manipulate or exfiltrate sensitive data, disrupt messaging services, and compromise the integrity and availability of critical business processes. This could result in operational downtime, financial losses, regulatory non-compliance, and reputational damage. Given IBM MQ's role in sectors such as banking, government, healthcare, and manufacturing, the vulnerability poses a risk to critical infrastructure and sensitive information. The requirement for authentication limits exposure to some extent, but insider threats or compromised credentials could be leveraged by attackers. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.

Mitigation Recommendations

To mitigate CVE-2025-0975, organizations should immediately restrict access to the IBM MQ console to only trusted and necessary personnel, enforcing strict authentication and authorization controls. Network segmentation and firewall rules should limit console access to secure management networks. Monitoring and logging of console activities should be enhanced to detect unusual or unauthorized commands indicative of exploitation attempts. Until official patches are released by IBM, consider applying temporary workarounds such as disabling or limiting features that process escape sequences in console inputs if feasible. Regularly update and rotate credentials to reduce the risk of compromised accounts. Conduct thorough security assessments and penetration tests focused on IBM MQ environments to identify potential exploitation paths. Once IBM releases patches or updates, prioritize their deployment in all affected environments. Additionally, educate administrators about the risks of this vulnerability and the importance of secure console usage practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-02-02T15:02:19.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1b985912abc71d0a0f1

Added to database: 2/26/2026, 7:40:41 PM

Last enriched: 2/26/2026, 7:45:22 PM

Last updated: 2/26/2026, 11:15:02 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses