Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25022: CWE-260 Password in Configuration File in IBM QRadar Suite Software

0
Critical
VulnerabilityCVE-2025-25022cvecve-2025-25022cwe-260
Published: Tue Jun 03 2025 (06/03/2025, 15:16:19 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: QRadar Suite Software

Description

IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:00:43 UTC

Technical Analysis

CVE-2025-25022 is a vulnerability identified in IBM QRadar Suite Software versions 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security versions 1.10.0.0 through 1.10.11.0. The flaw arises from the improper storage of passwords in configuration files, which are accessible to unauthenticated users within the environment. This vulnerability is categorized under CWE-260, indicating that sensitive credentials are stored in configuration files without sufficient protection, such as encryption or access controls. An attacker with network access but no authentication or user interaction can exploit this vulnerability to extract these credentials. The CVSS 3.1 base score of 9.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reflects that the attack vector is adjacent network, with low attack complexity, no privileges or user interaction required, and a scope change that impacts confidentiality, integrity, and availability at a high level. The exposure of passwords can lead to unauthorized access to the QRadar system and potentially other integrated systems, enabling attackers to manipulate security monitoring, exfiltrate data, or disrupt operations. While no public exploits are currently reported, the critical nature of the vulnerability necessitates urgent attention. The lack of available patches at the time of publication increases the risk window. IBM QRadar and Cloud Pak for Security are widely used in enterprise security environments, making this vulnerability particularly impactful.

Potential Impact

The impact of CVE-2025-25022 is severe for organizations globally that rely on IBM QRadar Suite and Cloud Pak for Security products. Exposure of passwords in configuration files to unauthenticated users can lead to full system compromise, including unauthorized access to security monitoring tools, manipulation or deletion of logs, and potential lateral movement within the network. This compromises the confidentiality, integrity, and availability of critical security infrastructure, undermining an organization's ability to detect and respond to threats. Attackers could leverage stolen credentials to escalate privileges, disable security controls, or exfiltrate sensitive data. The vulnerability's ease of exploitation and the critical role of affected products in security operations amplify the risk of widespread disruption. Organizations in sectors such as government, finance, healthcare, and critical infrastructure are particularly vulnerable due to their reliance on these products for threat detection and compliance. The absence of known exploits currently provides a limited window for mitigation before potential active exploitation emerges.

Mitigation Recommendations

To mitigate CVE-2025-25022, organizations should immediately assess their deployment of IBM QRadar Suite and Cloud Pak for Security to identify affected versions. Until official patches are released, implement strict network segmentation and access controls to limit exposure of the vulnerable systems to only trusted and necessary network segments. Employ host-based firewalls and intrusion detection systems to monitor and block unauthorized access attempts to configuration files. Review and harden file permissions on configuration files to restrict access to only essential system processes and administrators. Consider encrypting sensitive configuration files if supported by the product or through external means. Regularly audit and rotate credentials stored in configuration files to minimize the impact of potential exposure. Engage with IBM support for guidance on interim mitigations and monitor for patch releases or updates. Additionally, enhance monitoring for unusual access patterns or attempts to read configuration files. Educate security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-31T16:26:45.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f14ab182aa0cae2819e2b

Added to database: 6/3/2025, 3:28:43 PM

Last enriched: 2/26/2026, 9:00:43 PM

Last updated: 3/24/2026, 6:17:35 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses