Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2140: CWE-346 Origin Validation Error in IBM Engineering Requirements Management Doors Next

0
Medium
VulnerabilityCVE-2025-2140cvecve-2025-2140cwe-346
Published: Sun Oct 12 2025 (10/12/2025, 13:33:22 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Engineering Requirements Management Doors Next

Description

IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to spoof email identity of the sender due to improper verification of source data.

AI-Powered Analysis

AILast updated: 10/12/2025, 13:50:41 UTC

Technical Analysis

CVE-2025-2140 identifies a vulnerability in IBM Engineering Requirements Management Doors Next versions 7.0.2, 7.0.3, and 7.1, where improper origin validation (CWE-346) allows an authenticated user on the network to spoof the email sender identity. The root cause is insufficient verification of the source data used to determine the email sender, enabling attackers with legitimate network access and low privileges to impersonate other users or system components in email communications generated or processed by the application. This vulnerability does not disclose sensitive information or disrupt service availability but compromises the integrity of email-based communications within the affected environment. The CVSS v3.1 score of 5.7 reflects medium severity, with attack vector being adjacent network, low attack complexity, and no user interaction required. The attacker must be authenticated, which limits exposure to internal or trusted network users. No public exploits or active exploitation have been reported to date. The vulnerability could facilitate phishing, social engineering, or unauthorized command execution workflows if email trust is leveraged within organizational processes. IBM has not yet published patches but awareness and preparatory mitigation are advised.

Potential Impact

For European organizations, the primary impact is on the integrity of email communications within IBM Doors Next environments. Spoofed emails could be used to deceive employees, manipulate requirements management workflows, or escalate privileges through social engineering. This could lead to project delays, unauthorized changes in requirements, or leakage of strategic planning information indirectly. While confidentiality and availability are not directly affected, the trustworthiness of internal communications is undermined, potentially impacting compliance and audit trails. Organizations in sectors such as aerospace, automotive, defense, and critical infrastructure—where IBM Doors Next is commonly used—may face increased risk of targeted insider threats or supply chain manipulation. The requirement for authenticated access limits external exploitation but does not eliminate insider threat risks. The absence of known exploits reduces immediate urgency but does not preclude future attacks.

Mitigation Recommendations

Organizations should monitor IBM communications for official patches and apply them promptly once released. Until patches are available, restrict network access to IBM Doors Next to trusted users only and enforce strong authentication mechanisms. Implement additional email origin verification controls such as SPF, DKIM, and DMARC within the corporate email infrastructure to detect and block spoofed messages. Conduct user awareness training focused on recognizing spoofed emails and social engineering attempts. Review and harden internal workflows that rely on email-based approvals or commands within Doors Next to require multi-factor verification. Employ network segmentation to isolate the application environment and monitor for anomalous email traffic patterns. Maintain detailed logging and audit trails to detect suspicious activity related to email spoofing. Engage with IBM support for guidance and updates on remediation timelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-03-10T01:10:33.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ebb20ce7e4c74b800ba66e

Added to database: 10/12/2025, 1:50:04 PM

Last enriched: 10/12/2025, 1:50:41 PM

Last updated: 10/16/2025, 6:00:42 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats