Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36222: CWE-1188 Insecure Default Initialization of Resource in IBM Fusion

0
High
VulnerabilityCVE-2025-36222cvecve-2025-36222cwe-1188
Published: Thu Sep 11 2025 (09/11/2025, 20:44:06 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Fusion

Description

IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:46:52 UTC

Technical Analysis

CVE-2025-36222 is a vulnerability identified in IBM Fusion versions 2.2.0 through 2.10.1, including IBM Fusion HCI variants up to 2.10.0. The root cause is insecure default initialization of AMQStreams resources, which are messaging components used within IBM Fusion for data streaming and integration. Specifically, these AMQStreams instances are configured by default to allow access without client authentication, exposing them to unauthorized remote access. This configuration flaw falls under CWE-1188, which concerns insecure default initialization of resources. An attacker exploiting this vulnerability can remotely connect to the AMQStreams service and perform unauthorized actions, potentially including reading sensitive data streams or manipulating message flows, thereby compromising confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 8.7, reflecting network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with high impact on confidentiality (C:H) and integrity (I:H), but no impact on availability (A:N). No public exploits have been reported yet, but the presence of insecure defaults in critical messaging infrastructure poses a significant risk. IBM Fusion is widely used in enterprise environments for data integration and analytics, making this vulnerability particularly concerning for organizations relying on these platforms for secure data processing. The lack of client authentication by default means that attackers can potentially bypass security controls and gain unauthorized access to sensitive data streams. Remediation will require administrators to review and update the default configurations to enforce client authentication on AMQStreams and monitor for any suspicious access. IBM is expected to release patches or configuration guidance to address this issue.

Potential Impact

The vulnerability can lead to unauthorized remote access to AMQStreams messaging components within IBM Fusion environments, allowing attackers to read or manipulate sensitive data streams. This compromises the confidentiality and integrity of enterprise data pipelines, potentially leading to data breaches, data tampering, or disruption of critical analytics workflows. Since AMQStreams often handle real-time data integration, exploitation could affect business decision-making processes and operational continuity. The high CVSS score indicates a severe risk, especially given no authentication is required and no user interaction is needed, enabling remote exploitation. Organizations worldwide using affected IBM Fusion versions may face regulatory compliance issues, reputational damage, and operational risks if exploited. The scope change in the CVSS vector suggests that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting interconnected systems. Although availability is not directly affected, the integrity and confidentiality impacts alone can have serious consequences for enterprises relying on IBM Fusion for secure data handling.

Mitigation Recommendations

Administrators should immediately audit their IBM Fusion and IBM Fusion HCI deployments to identify instances running affected versions (2.2.0 through 2.10.1). They must verify the configuration of AMQStreams resources to ensure client authentication is enforced and disable any insecure default settings that allow unauthenticated access. Until vendor patches are released, consider isolating AMQStreams endpoints within trusted network segments and applying strict network access controls such as firewall rules and VPN requirements to limit exposure. Implement continuous monitoring and logging of AMQStreams access to detect unauthorized connection attempts. Engage with IBM support to obtain any available security advisories or interim configuration guidance. Plan for timely patch deployment once IBM releases updates addressing this vulnerability. Additionally, review and strengthen overall messaging infrastructure security policies, including authentication mechanisms, encryption, and access controls, to reduce attack surface. Conduct penetration testing focused on messaging components to validate the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:41.802Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c41d5dd839f9a306304f6b

Added to database: 9/12/2025, 1:17:17 PM

Last enriched: 2/27/2026, 1:46:52 AM

Last updated: 3/26/2026, 6:53:24 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses