Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14810: CWE-613 Insufficient Session Expiration in IBM InfoSphere Information Server

0
Medium
VulnerabilityCVE-2025-14810cvecve-2025-14810cwe-613
Published: Wed Mar 25 2026 (03/25/2026, 20:11:21 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: InfoSphere Information Server

Description

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate a session after privileges have been modified which could allow an authenticated user to retain access to sensitive information. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE: CWE-613: Insufficient Session Expiration CVSS Source: IBM CVSS Base score: 6.3 CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 20:49:11 UTC

Technical Analysis

CVE-2025-14810 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6. The core issue is that when a user's privileges are modified during an active session, the system fails to invalidate or refresh the session token accordingly. This means that an authenticated user who had higher privileges before the change can continue to access sensitive information or perform actions beyond their current authorization level. The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have some privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). This flaw could lead to unauthorized data exposure or modification if an attacker exploits the stale session. IBM has published this vulnerability with a CVSS score of 6.3, indicating a medium severity level. No patches or exploits are currently documented, but the risk remains significant for environments relying on session-based access controls without proper session invalidation mechanisms.

Potential Impact

The vulnerability allows authenticated users to retain access to sensitive data or perform unauthorized actions after their privileges have been reduced, potentially leading to unauthorized disclosure or modification of information. This undermines the principle of least privilege and session security, increasing the risk of insider threats or privilege escalation abuse. For organizations, this could result in data breaches, compliance violations, and damage to reputation. Since IBM InfoSphere Information Server is widely used for data integration and governance in large enterprises, the impact could affect critical business processes and sensitive data handling. The medium severity score reflects that while the vulnerability requires some level of authentication, the ease of exploitation and potential for unauthorized access make it a notable risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks.

Mitigation Recommendations

Organizations should immediately review and apply any available patches or updates from IBM once released. In the absence of patches, implement compensating controls such as enforcing shorter session timeouts and requiring re-authentication after privilege changes. Monitor user sessions actively for unusual access patterns, especially after privilege modifications. Employ strict access control policies and audit logs to detect and respond to unauthorized access attempts. Consider integrating multi-factor authentication to reduce the risk of compromised credentials being exploited. Additionally, review and harden session management mechanisms to ensure sessions are invalidated or refreshed upon any change in user privileges. Regularly train administrators and users on secure session handling practices and privilege management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-16T22:58:57.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c44608f4197a8e3b7facbb

Added to database: 3/25/2026, 8:31:04 PM

Last enriched: 3/25/2026, 8:49:11 PM

Last updated: 3/26/2026, 5:25:35 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses