Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33119: CWE-260 Password in Configuration File in IBM QRadar Security Information and Event Management

0
Medium
VulnerabilityCVE-2025-33119cvecve-2025-33119cwe-260
Published: Wed Nov 12 2025 (11/12/2025, 21:19:55 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: QRadar Security Information and Event Management

Description

IBM QRadar SIEM 7.5 through 7.5.0 UP14 stores user credentials in configuration files in source control which can be read by an authenticated user.

AI-Powered Analysis

AILast updated: 11/19/2025, 23:16:21 UTC

Technical Analysis

CVE-2025-33119 is a vulnerability identified in IBM QRadar Security Information and Event Management (SIEM) software versions 7.5 through 7.5.0 UP14. The issue arises because user credentials are stored in configuration files that are committed to source control repositories. These configuration files, accessible to authenticated users, expose sensitive password information, violating secure credential storage best practices (CWE-260: Credentials Management). The vulnerability does not require user interaction and can be exploited remotely over the network by an authenticated user with low privileges. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the high confidentiality impact but no impact on integrity or availability. The vulnerability's scope is limited to confidentiality compromise of stored credentials, which could lead to further privilege escalation or lateral movement if attackers leverage the exposed passwords. No public exploits have been reported yet, but the presence of credentials in source control is a critical security misconfiguration that can be leveraged by insiders or attackers who gain initial access. IBM has not yet published patches or mitigation instructions, so organizations must proactively audit and secure their configuration management processes. This vulnerability highlights the risk of improper credential handling in enterprise security products and the importance of segregating sensitive data from source control.

Potential Impact

For European organizations, the exposure of user credentials in IBM QRadar SIEM configuration files can lead to unauthorized access to the SIEM platform, which is a critical component for security monitoring and incident response. Compromise of QRadar credentials could allow attackers to manipulate logs, evade detection, or gain deeper access to the network, undermining the organization's security posture. This is particularly concerning for sectors reliant on QRadar for compliance and threat detection, such as finance, energy, telecommunications, and government agencies. The confidentiality breach could facilitate lateral movement within networks, increasing the risk of data breaches and operational disruption. Given the widespread use of IBM QRadar in Europe, especially in countries with mature cybersecurity infrastructures, the impact could be significant if exploited. However, the lack of integrity and availability impact limits the immediate operational disruption. The medium severity rating suggests that while the threat is serious, it is not critical unless combined with other vulnerabilities or poor security practices.

Mitigation Recommendations

European organizations should immediately audit their IBM QRadar SIEM deployments to identify any configuration files stored in source control repositories containing credentials. Access controls to these repositories must be tightened to restrict access strictly to necessary personnel. Credentials should be removed from source control and replaced with secure vault solutions or environment variables managed by dedicated secrets management tools. Organizations should implement multi-factor authentication (MFA) for QRadar access to reduce the risk of credential misuse. Monitoring and alerting on unusual access patterns to configuration files and QRadar systems should be enhanced. Until IBM releases official patches or guidance, organizations should consider isolating QRadar management interfaces and limiting network exposure. Regularly reviewing and rotating credentials stored in QRadar is recommended. Finally, organizations should stay updated with IBM advisories and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:56.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914fdef6c8e220c428f7f3a

Added to database: 11/12/2025, 9:36:47 PM

Last enriched: 11/19/2025, 11:16:21 PM

Last updated: 12/27/2025, 10:07:06 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats