Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36222: CWE-1188 Insecure Default Initialization of Resource in IBM Fusion

0
High
VulnerabilityCVE-2025-36222cvecve-2025-36222cwe-1188
Published: Thu Sep 11 2025 (09/11/2025, 20:44:06 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Fusion

Description

IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:56:57 UTC

Technical Analysis

CVE-2025-36222 is a high-severity vulnerability affecting IBM Fusion versions 2.2.0 through 2.10.1, IBM Fusion HCI versions 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx versions 2.8.2 through 2.10.0. The vulnerability stems from insecure default initialization of resources, specifically related to AMQStreams, a messaging platform integrated within these IBM Fusion products. Due to insecure default configurations, AMQStreams can be exposed without requiring client authentication. This misconfiguration allows an unauthenticated attacker to connect to the AMQStreams service and perform unauthorized actions, potentially compromising confidentiality and integrity of data streams. The vulnerability is classified under CWE-1188, which refers to insecure default initialization of resources, indicating that the product ships with settings that are not secure by default, increasing the attack surface. The CVSS v3.1 base score is 8.7 (high), with vector AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N, meaning the attack is network-based, requires high attack complexity, no privileges or user interaction, and impacts confidentiality and integrity with a changed scope. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that organizations should prioritize mitigation and monitoring. The vulnerability could allow attackers to intercept, modify, or inject messages within AMQStreams, potentially disrupting business processes relying on IBM Fusion's messaging capabilities or leaking sensitive information.

Potential Impact

For European organizations using IBM Fusion and its variants, this vulnerability poses a significant risk to the confidentiality and integrity of their messaging infrastructure. AMQStreams is often used for critical data streaming and integration tasks; unauthorized access could lead to data leakage, manipulation of business-critical messages, or unauthorized command execution within the messaging environment. This could disrupt operations, lead to compliance violations (e.g., GDPR breaches if personal data is exposed), and damage organizational reputation. Given the network-exploitable nature and lack of authentication, attackers could remotely exploit this vulnerability without user interaction, increasing the risk of widespread compromise. Industries such as finance, telecommunications, manufacturing, and public sector entities in Europe that rely on IBM Fusion for integration and data streaming are particularly at risk. The impact is exacerbated by the fact that the vulnerability affects multiple versions, including recent ones, meaning many organizations may be running vulnerable instances.

Mitigation Recommendations

European organizations should immediately review their IBM Fusion deployments to identify affected versions (2.2.0 through 2.10.1 for Fusion, 2.2.0 through 2.10.0 for Fusion HCI, and 2.8.2 through 2.10.0 for Fusion HCI for watsonx). Until official patches are released, organizations should: 1) Disable or restrict network access to AMQStreams endpoints, limiting exposure to trusted internal networks only. 2) Implement network-level controls such as firewalls and segmentation to isolate AMQStreams services from untrusted networks. 3) Enforce strict authentication and authorization policies where configurable, overriding insecure defaults. 4) Monitor network traffic and logs for unusual or unauthorized access attempts to AMQStreams. 5) Engage with IBM support for guidance on interim mitigations and patch timelines. 6) Plan and test upgrades to versions that address this vulnerability once available. Additionally, organizations should conduct a thorough audit of their messaging infrastructure to ensure no unauthorized changes or data exfiltration have occurred.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:41.802Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c41d5dd839f9a306304f6b

Added to database: 9/12/2025, 1:17:17 PM

Last enriched: 9/19/2025, 3:56:57 PM

Last updated: 10/30/2025, 2:09:58 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats