Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next

0
Medium
VulnerabilityCVE-2025-33096cvecve-2025-33096cwe-674
Published: Sun Oct 12 2025 (10/12/2025, 13:31:04 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Engineering Requirements Management Doors Next

Description

IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.

AI-Powered Analysis

AILast updated: 10/20/2025, 01:15:51 UTC

Technical Analysis

CVE-2025-33096 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The issue arises from CWE-674, which is characterized by uncontrolled recursion that can lead to resource exhaustion and denial of service. Specifically, an authenticated user can upload specially crafted files that trigger uncontrolled recursive processing within the application. This recursive behavior can cause the application to consume excessive CPU or memory resources, ultimately leading to a denial of service condition where legitimate users are unable to access the service. The vulnerability requires the attacker to have valid credentials (privileges) to upload files, but does not require any further user interaction. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely once authenticated. The CVSS v3.1 score of 6.5 reflects a medium severity, with no impact on confidentiality or integrity, but a high impact on availability. Currently, there are no known exploits in the wild and no official patches have been published, indicating that organizations should be vigilant and prepare mitigation strategies. The vulnerability is particularly relevant for organizations that use IBM DOORS Next for requirements management in software and systems engineering, as denial of service could disrupt critical development workflows.

Potential Impact

For European organizations, the primary impact is a denial of service that can disrupt engineering and development processes relying on IBM DOORS Next. This can delay project timelines, reduce productivity, and potentially impact compliance with regulatory requirements in industries such as automotive, aerospace, defense, and manufacturing where requirements traceability is critical. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The lack of confidentiality or integrity impact limits data breach concerns, but availability interruptions can have cascading effects on dependent systems and teams. Organizations with large-scale deployments or those integrating DOORS Next into continuous integration/continuous deployment (CI/CD) pipelines may experience amplified disruption. The absence of known exploits reduces immediate risk, but the medium severity score and the critical nature of affected processes warrant proactive mitigation.

Mitigation Recommendations

1. Restrict file upload permissions to only trusted and necessary users to reduce the attack surface. 2. Implement strict input validation and scanning of uploaded files to detect and block malformed or suspicious content that could trigger recursion. 3. Monitor application resource usage (CPU, memory) closely to detect abnormal spikes that may indicate exploitation attempts. 4. Enforce strong authentication and credential management policies to prevent unauthorized access. 5. Isolate the DOORS Next environment where possible to limit impact scope. 6. Engage with IBM support and subscribe to security advisories to obtain patches or updates as soon as they become available. 7. Consider implementing rate limiting or upload size restrictions to mitigate resource exhaustion risks. 8. Conduct regular security assessments and penetration testing focused on file upload functionalities. 9. Prepare incident response plans specifically addressing denial of service scenarios in engineering tools. 10. Educate users about the risks of uploading untrusted files even within authenticated sessions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:40.773Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ebb20ce7e4c74b800ba671

Added to database: 10/12/2025, 1:50:04 PM

Last enriched: 10/20/2025, 1:15:51 AM

Last updated: 12/5/2025, 1:59:32 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats