CVE-2025-36011: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.24 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI Analysis
Technical Summary
CVE-2025-36011 identifies a vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.24, where the application fails to set the 'Secure' attribute on authorization tokens or session cookies. The 'Secure' attribute is a critical security flag that instructs browsers to only send cookies over HTTPS connections, thereby protecting sensitive session information from being transmitted over unencrypted HTTP channels. Without this attribute, session cookies can be inadvertently sent over insecure HTTP links. An attacker can exploit this by tricking a user into clicking an HTTP link or embedding such a link in a website the user visits. When the browser sends the cookie over HTTP, an attacker monitoring the network traffic (e.g., on an unsecured Wi-Fi network) can intercept and steal the cookie value. This stolen cookie can potentially be used to hijack the user's session or gain unauthorized access to the IBM Jazz for Service Management environment. The vulnerability is classified under CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute), highlighting a common but impactful misconfiguration in web application security. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking a malicious link). The impact is limited to confidentiality loss of session cookies, with no direct integrity or availability impact. No known exploits are reported in the wild as of the publication date. IBM has not yet provided patch links, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability poses a risk of session hijacking through interception of session cookies transmitted over insecure HTTP connections. The confidentiality breach could allow attackers to impersonate legitimate users, potentially accessing sensitive service management data, disrupting workflows, or escalating privileges within the application. Given that IBM Jazz for Service Management is often used in IT service management and operational environments, unauthorized access could lead to exposure of internal processes, service tickets, and possibly sensitive customer or operational data. The risk is heightened in environments where users access the service management portal over public or unsecured networks, such as remote work scenarios common in Europe. However, the absence of known exploits and the medium CVSS score suggest the threat is moderate but should not be ignored. Organizations with strict compliance requirements under GDPR must consider the confidentiality implications seriously, as session cookie leakage could constitute a personal data breach if user identities or personal information are accessible via the compromised sessions.
Mitigation Recommendations
1. Immediate mitigation involves enforcing HTTPS-only access to IBM Jazz for Service Management portals and ensuring all links and resources use HTTPS URLs exclusively to prevent accidental HTTP requests. 2. IBM and affected organizations should prioritize applying patches or updates that set the 'Secure' attribute on all session and authorization cookies. Until patches are available, organizations can implement web application firewalls (WAFs) or reverse proxies to rewrite cookies with the Secure flag. 3. Educate users to avoid clicking on suspicious or unsecured HTTP links related to the service management system, especially when accessing from untrusted networks. 4. Implement network-level protections such as VPNs or secure Wi-Fi to reduce the risk of traffic interception. 5. Monitor session activity for anomalies indicating possible session hijacking attempts. 6. Review and enforce strict cookie security policies, including HttpOnly and SameSite attributes, to further reduce attack surface. 7. Conduct regular security assessments and penetration testing focused on session management controls within IBM Jazz for Service Management.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-36011: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
Description
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.24 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI-Powered Analysis
Technical Analysis
CVE-2025-36011 identifies a vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.24, where the application fails to set the 'Secure' attribute on authorization tokens or session cookies. The 'Secure' attribute is a critical security flag that instructs browsers to only send cookies over HTTPS connections, thereby protecting sensitive session information from being transmitted over unencrypted HTTP channels. Without this attribute, session cookies can be inadvertently sent over insecure HTTP links. An attacker can exploit this by tricking a user into clicking an HTTP link or embedding such a link in a website the user visits. When the browser sends the cookie over HTTP, an attacker monitoring the network traffic (e.g., on an unsecured Wi-Fi network) can intercept and steal the cookie value. This stolen cookie can potentially be used to hijack the user's session or gain unauthorized access to the IBM Jazz for Service Management environment. The vulnerability is classified under CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute), highlighting a common but impactful misconfiguration in web application security. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking a malicious link). The impact is limited to confidentiality loss of session cookies, with no direct integrity or availability impact. No known exploits are reported in the wild as of the publication date. IBM has not yet provided patch links, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability poses a risk of session hijacking through interception of session cookies transmitted over insecure HTTP connections. The confidentiality breach could allow attackers to impersonate legitimate users, potentially accessing sensitive service management data, disrupting workflows, or escalating privileges within the application. Given that IBM Jazz for Service Management is often used in IT service management and operational environments, unauthorized access could lead to exposure of internal processes, service tickets, and possibly sensitive customer or operational data. The risk is heightened in environments where users access the service management portal over public or unsecured networks, such as remote work scenarios common in Europe. However, the absence of known exploits and the medium CVSS score suggest the threat is moderate but should not be ignored. Organizations with strict compliance requirements under GDPR must consider the confidentiality implications seriously, as session cookie leakage could constitute a personal data breach if user identities or personal information are accessible via the compromised sessions.
Mitigation Recommendations
1. Immediate mitigation involves enforcing HTTPS-only access to IBM Jazz for Service Management portals and ensuring all links and resources use HTTPS URLs exclusively to prevent accidental HTTP requests. 2. IBM and affected organizations should prioritize applying patches or updates that set the 'Secure' attribute on all session and authorization cookies. Until patches are available, organizations can implement web application firewalls (WAFs) or reverse proxies to rewrite cookies with the Secure flag. 3. Educate users to avoid clicking on suspicious or unsecured HTTP links related to the service management system, especially when accessing from untrusted networks. 4. Implement network-level protections such as VPNs or secure Wi-Fi to reduce the risk of traffic interception. 5. Monitor session activity for anomalies indicating possible session hijacking attempts. 6. Review and enforce strict cookie security policies, including HttpOnly and SameSite attributes, to further reduce attack surface. 7. Conduct regular security assessments and penetration testing focused on session management controls within IBM Jazz for Service Management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:07.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c082c41d20e9585176cde3
Added to database: 9/9/2025, 7:40:52 PM
Last enriched: 9/9/2025, 7:42:05 PM
Last updated: 9/9/2025, 7:42:05 PM
Views: 2
Related Threats
CVE-2025-57633: n/a
CriticalCVE-2025-54084: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Calix GigaCenter ONT
HighCVE-2025-53913: CWE-269 Improper Privilege Management in Calix GigaCenter ONT
HighCVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node
HighCVE-2025-54083: CWE-922 Insecure Storage of Sensitive Information in Calix GigaCenter ONT
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.