CVE-2025-36222: CWE-1188 Insecure Default Initialization of Resource in IBM Fusion
IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.
AI Analysis
Technical Summary
CVE-2025-36222 is a high-severity vulnerability affecting IBM Fusion versions 2.2.0 through 2.10.1, IBM Fusion HCI versions 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx versions 2.8.2 through 2.10.0. The vulnerability stems from insecure default initialization of resources, specifically related to AMQStreams, a messaging platform integrated within these IBM Fusion products. Due to insecure default configurations, AMQStreams can be exposed without requiring client authentication. This misconfiguration allows an unauthenticated attacker to connect to the AMQStreams service and perform unauthorized actions, potentially compromising confidentiality and integrity of data streams. The vulnerability is classified under CWE-1188, which refers to insecure default initialization of resources, indicating that the product ships with settings that are not secure by default, increasing the attack surface. The CVSS v3.1 base score is 8.7 (high), with vector AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N, meaning the attack is network-based, requires high attack complexity, no privileges or user interaction, and impacts confidentiality and integrity with a changed scope. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that organizations should prioritize mitigation and monitoring. The vulnerability could allow attackers to intercept, modify, or inject messages within AMQStreams, potentially disrupting business processes relying on IBM Fusion's messaging capabilities or leaking sensitive information.
Potential Impact
For European organizations using IBM Fusion and its variants, this vulnerability poses a significant risk to the confidentiality and integrity of their messaging infrastructure. AMQStreams is often used for critical data streaming and integration tasks; unauthorized access could lead to data leakage, manipulation of business-critical messages, or unauthorized command execution within the messaging environment. This could disrupt operations, lead to compliance violations (e.g., GDPR breaches if personal data is exposed), and damage organizational reputation. Given the network-exploitable nature and lack of authentication, attackers could remotely exploit this vulnerability without user interaction, increasing the risk of widespread compromise. Industries such as finance, telecommunications, manufacturing, and public sector entities in Europe that rely on IBM Fusion for integration and data streaming are particularly at risk. The impact is exacerbated by the fact that the vulnerability affects multiple versions, including recent ones, meaning many organizations may be running vulnerable instances.
Mitigation Recommendations
European organizations should immediately review their IBM Fusion deployments to identify affected versions (2.2.0 through 2.10.1 for Fusion, 2.2.0 through 2.10.0 for Fusion HCI, and 2.8.2 through 2.10.0 for Fusion HCI for watsonx). Until official patches are released, organizations should: 1) Disable or restrict network access to AMQStreams endpoints, limiting exposure to trusted internal networks only. 2) Implement network-level controls such as firewalls and segmentation to isolate AMQStreams services from untrusted networks. 3) Enforce strict authentication and authorization policies where configurable, overriding insecure defaults. 4) Monitor network traffic and logs for unusual or unauthorized access attempts to AMQStreams. 5) Engage with IBM support for guidance on interim mitigations and patch timelines. 6) Plan and test upgrades to versions that address this vulnerability once available. Additionally, organizations should conduct a thorough audit of their messaging infrastructure to ensure no unauthorized changes or data exfiltration have occurred.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36222: CWE-1188 Insecure Default Initialization of Resource in IBM Fusion
Description
IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.
AI-Powered Analysis
Technical Analysis
CVE-2025-36222 is a high-severity vulnerability affecting IBM Fusion versions 2.2.0 through 2.10.1, IBM Fusion HCI versions 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx versions 2.8.2 through 2.10.0. The vulnerability stems from insecure default initialization of resources, specifically related to AMQStreams, a messaging platform integrated within these IBM Fusion products. Due to insecure default configurations, AMQStreams can be exposed without requiring client authentication. This misconfiguration allows an unauthenticated attacker to connect to the AMQStreams service and perform unauthorized actions, potentially compromising confidentiality and integrity of data streams. The vulnerability is classified under CWE-1188, which refers to insecure default initialization of resources, indicating that the product ships with settings that are not secure by default, increasing the attack surface. The CVSS v3.1 base score is 8.7 (high), with vector AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N, meaning the attack is network-based, requires high attack complexity, no privileges or user interaction, and impacts confidentiality and integrity with a changed scope. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that organizations should prioritize mitigation and monitoring. The vulnerability could allow attackers to intercept, modify, or inject messages within AMQStreams, potentially disrupting business processes relying on IBM Fusion's messaging capabilities or leaking sensitive information.
Potential Impact
For European organizations using IBM Fusion and its variants, this vulnerability poses a significant risk to the confidentiality and integrity of their messaging infrastructure. AMQStreams is often used for critical data streaming and integration tasks; unauthorized access could lead to data leakage, manipulation of business-critical messages, or unauthorized command execution within the messaging environment. This could disrupt operations, lead to compliance violations (e.g., GDPR breaches if personal data is exposed), and damage organizational reputation. Given the network-exploitable nature and lack of authentication, attackers could remotely exploit this vulnerability without user interaction, increasing the risk of widespread compromise. Industries such as finance, telecommunications, manufacturing, and public sector entities in Europe that rely on IBM Fusion for integration and data streaming are particularly at risk. The impact is exacerbated by the fact that the vulnerability affects multiple versions, including recent ones, meaning many organizations may be running vulnerable instances.
Mitigation Recommendations
European organizations should immediately review their IBM Fusion deployments to identify affected versions (2.2.0 through 2.10.1 for Fusion, 2.2.0 through 2.10.0 for Fusion HCI, and 2.8.2 through 2.10.0 for Fusion HCI for watsonx). Until official patches are released, organizations should: 1) Disable or restrict network access to AMQStreams endpoints, limiting exposure to trusted internal networks only. 2) Implement network-level controls such as firewalls and segmentation to isolate AMQStreams services from untrusted networks. 3) Enforce strict authentication and authorization policies where configurable, overriding insecure defaults. 4) Monitor network traffic and logs for unusual or unauthorized access attempts to AMQStreams. 5) Engage with IBM support for guidance on interim mitigations and patch timelines. 6) Plan and test upgrades to versions that address this vulnerability once available. Additionally, organizations should conduct a thorough audit of their messaging infrastructure to ensure no unauthorized changes or data exfiltration have occurred.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:41.802Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c41d5dd839f9a306304f6b
Added to database: 9/12/2025, 1:17:17 PM
Last enriched: 9/19/2025, 3:56:57 PM
Last updated: 10/30/2025, 2:09:58 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumCVE-2025-63608: n/a
HighRussian Hackers Exploit Adaptix Multi-Platform Pentesting Tool in Ransomware Attacks
HighCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.