Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2139: CWE-602 Client-Side Enforcement of Server-Side Security in IBM Engineering Requirements Management Doors Next

0
Low
VulnerabilityCVE-2025-2139cvecve-2025-2139cwe-602
Published: Sun Oct 12 2025 (10/12/2025, 13:35:24 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Engineering Requirements Management Doors Next

Description

IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete reviews from other users due to client-side enforcement of server-side security.

AI-Powered Analysis

AILast updated: 10/12/2025, 13:50:56 UTC

Technical Analysis

CVE-2025-2139 is a security vulnerability identified in IBM Engineering Requirements Management Doors Next versions 7.0.2, 7.0.3, and 7.1. The root cause is improper enforcement of security controls on the client side rather than the server side. Specifically, the application relies on client-side mechanisms to enforce permissions related to deleting reviews, which can be manipulated by an authenticated user with network access. This allows such a user to delete reviews authored by other users, violating data integrity and potentially disrupting collaborative workflows and audit trails. The vulnerability is classified under CWE-602, which pertains to client-side enforcement of server-side security. The CVSS v3.1 base score is 3.5, indicating low severity, with attack vector as adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). The impact affects integrity (I:L) but not confidentiality or availability. No patches or exploits are currently reported, but the vulnerability is publicly disclosed as of October 12, 2025. Organizations using the affected IBM Doors Next versions should review their access controls and consider compensating controls until a patch is available.

Potential Impact

For European organizations, the primary impact of this vulnerability is on the integrity of project documentation and review processes within IBM Engineering Requirements Management Doors Next. Unauthorized deletion of reviews can lead to loss of critical audit information, miscommunication among project stakeholders, and potential compliance issues, especially in regulated industries such as automotive, aerospace, and defense where IBM Doors Next is commonly used. While the vulnerability does not directly impact confidentiality or availability, the disruption of review records can undermine trust in the requirements management process and delay project timelines. Since exploitation requires authenticated network access, insider threats or compromised credentials pose the greatest risk. The low CVSS score reflects limited impact scope, but organizations with stringent compliance requirements or heavy reliance on this tool should prioritize mitigation to maintain data integrity and auditability.

Mitigation Recommendations

1. Restrict network access to IBM Engineering Requirements Management Doors Next to trusted users and networks only, employing network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication mechanisms and monitor for suspicious login activities to reduce the risk of credential compromise. 3. Implement role-based access controls (RBAC) and regularly audit user permissions to ensure only authorized users have deletion privileges. 4. Monitor application logs for unusual deletion activities or patterns that could indicate exploitation attempts. 5. Until an official patch is released, consider deploying application-layer proxies or web application firewalls (WAFs) with custom rules to detect and block unauthorized deletion requests. 6. Educate users about the risk of credential sharing and the importance of reporting suspicious behavior. 7. Maintain regular backups of project data and review records to enable recovery in case of unauthorized deletions. 8. Engage with IBM support for updates on patches or workarounds addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-03-10T01:10:32.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ebb20ce7e4c74b800ba66b

Added to database: 10/12/2025, 1:50:04 PM

Last enriched: 10/12/2025, 1:50:56 PM

Last updated: 10/16/2025, 12:01:05 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats