Skip to main content

CVE-2025-25019: CWE-613 Insufficient Session Expiration in IBM QRadar Suite Software

Medium
VulnerabilityCVE-2025-25019cvecve-2025-25019cwe-613
Published: Tue Jun 03 2025 (06/03/2025, 15:14:47 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: QRadar Suite Software

Description

IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system.

AI-Powered Analysis

AILast updated: 08/25/2025, 00:36:13 UTC

Technical Analysis

CVE-2025-25019 is a vulnerability identified in IBM QRadar Suite Software versions 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0. The issue stems from insufficient session expiration controls, specifically that the software does not invalidate user sessions properly after logout. This flaw is categorized under CWE-613: Insufficient Session Expiration. When a user logs out, the session token or identifier remains valid, allowing an attacker who obtains this session token to impersonate the original user without needing to authenticate again. The vulnerability is remotely exploitable over the network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact primarily affects confidentiality and integrity, as unauthorized users could access sensitive data or perform actions under another user's identity. Availability is not impacted. The CVSS 3.1 base score is 4.8, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is critical in environments where IBM QRadar Suite or IBM Cloud Pak for Security are used for security monitoring and incident response, as session hijacking could lead to unauthorized access to security logs, alerts, and configurations, potentially undermining an organization's security posture.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on IBM QRadar Suite or IBM Cloud Pak for Security for their Security Information and Event Management (SIEM) and security orchestration needs. Unauthorized session reuse could allow attackers to bypass authentication controls, leading to potential data breaches, unauthorized changes to security configurations, or manipulation of security alerts. This could compromise the integrity of security monitoring and incident response processes, delaying detection and remediation of other attacks. Given the GDPR and other stringent data protection regulations in Europe, unauthorized access to sensitive security data could also lead to regulatory penalties and reputational damage. The medium severity rating suggests that while exploitation is not trivial, the consequences of a successful attack could be impactful in critical infrastructure, financial institutions, and government agencies that depend heavily on these IBM products for security operations.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor IBM's official security advisories closely and apply patches or updates as soon as they become available to address this session expiration flaw. 2) In the interim, enforce strict session timeout policies and consider additional session management controls such as multi-factor authentication (MFA) to reduce the risk of session hijacking. 3) Restrict network access to IBM QRadar and Cloud Pak for Security management interfaces using network segmentation and firewall rules to limit exposure to trusted IP ranges only. 4) Implement continuous monitoring and anomaly detection to identify unusual session reuse or suspicious user activity that may indicate exploitation attempts. 5) Educate security operations teams about this vulnerability to ensure rapid response if suspicious behavior is detected. 6) Review and harden logout mechanisms and session handling configurations where possible, including invalidating session tokens on logout manually if supported by the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-31T16:26:45.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f14ab182aa0cae2819e27

Added to database: 6/3/2025, 3:28:43 PM

Last enriched: 8/25/2025, 12:36:13 AM

Last updated: 9/15/2025, 3:29:48 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats