Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36087: CWE-798 Use of Hard-coded Credentials in IBM Security Verify Access

0
High
VulnerabilityCVE-2025-36087cvecve-2025-36087cwe-798
Published: Mon Oct 13 2025 (10/13/2025, 00:38:14 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Verify Access

Description

CVE-2025-36087 is a high-severity vulnerability in IBM Security Verify Access versions 10. 0. 0 through 10. 0. 9 and 11. 0. 0, involving the use of hard-coded credentials. These credentials may be passwords or cryptographic keys used for inbound authentication, outbound communication, or internal data encryption. The vulnerability allows remote attackers to exploit the system without authentication or user interaction, potentially compromising confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected components.

AI-Powered Analysis

AILast updated: 10/13/2025, 01:02:13 UTC

Technical Analysis

CVE-2025-36087 identifies a vulnerability classified under CWE-798, which concerns the use of hard-coded credentials within IBM Security Verify Access and IBM Verify Identity Access Container products, specifically versions 10.0.0 through 10.0.9 and 11.0.0. These hard-coded credentials—such as passwords or cryptographic keys—are embedded within the software and used for critical functions including inbound authentication, outbound communication with external components, or encryption of internal data. Because these credentials are static and embedded in the code, attackers who discover them can bypass authentication mechanisms remotely without needing prior access or user interaction. The CVSS v3.1 score of 8.1 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector and no requirement for privileges or user interaction. The vulnerability affects core identity and access management components, potentially allowing attackers to impersonate legitimate services, intercept or manipulate sensitive data, or disrupt authentication workflows. Although no exploits have been reported in the wild yet, the presence of hard-coded credentials is a critical security flaw that can facilitate unauthorized access and lateral movement within affected environments. The vulnerability was publicly disclosed in October 2025, with IBM likely to release patches or mitigations. Until patches are applied, organizations remain at risk, especially if the affected products are exposed to untrusted networks or lack compensating controls.

Potential Impact

For European organizations, the impact of CVE-2025-36087 is significant due to the widespread use of IBM Security Verify Access in enterprise identity and access management infrastructures. Exploitation could lead to unauthorized access to sensitive systems and data, undermining confidentiality and integrity of authentication processes. Attackers could leverage the hard-coded credentials to impersonate legitimate services, intercept or alter communications, and potentially disrupt availability by interfering with authentication workflows. This could result in data breaches, compliance violations (e.g., GDPR), and operational disruptions. The vulnerability's remote exploitability without authentication increases the risk of widespread attacks, especially in environments where these products are internet-facing or insufficiently segmented. European organizations in finance, government, healthcare, and critical infrastructure sectors, which rely heavily on robust identity management, are particularly vulnerable. The breach of these systems could also facilitate further lateral movement and privilege escalation within networks, amplifying the overall damage.

Mitigation Recommendations

1. Monitor IBM's official channels for patches addressing CVE-2025-36087 and apply them promptly once available. 2. Conduct a thorough audit of all IBM Security Verify Access and Verify Identity Access Container deployments to identify and document any use of hard-coded credentials. 3. Where possible, replace hard-coded credentials with dynamically managed secrets stored in secure vaults or use environment-based configuration to avoid embedding sensitive data in code. 4. Implement strict network segmentation to isolate identity management components from untrusted networks, limiting exposure to potential attackers. 5. Deploy enhanced monitoring and anomaly detection focused on authentication and communication patterns involving these IBM products to detect suspicious activity indicative of exploitation attempts. 6. Review and tighten access controls and logging to ensure rapid detection and response to unauthorized access. 7. Educate system administrators and security teams about the risks of hard-coded credentials and enforce secure coding and configuration management practices to prevent recurrence. 8. Consider temporary compensating controls such as firewall rules or VPN requirements to restrict access to affected services until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:13.891Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ec4e11fbc519dcfe5af6fd

Added to database: 10/13/2025, 12:55:45 AM

Last enriched: 10/13/2025, 1:02:13 AM

Last updated: 10/13/2025, 4:00:06 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats