Skip to main content

CVE-2025-36222: CWE-1188 Insecure Default Initialization of Resource in IBM Fusion

High
VulnerabilityCVE-2025-36222cvecve-2025-36222cwe-1188
Published: Thu Sep 11 2025 (09/11/2025, 20:44:06 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Fusion

Description

IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.

AI-Powered Analysis

AILast updated: 09/12/2025, 13:17:38 UTC

Technical Analysis

CVE-2025-36222 is a high-severity vulnerability affecting IBM Fusion versions 2.2.0 through 2.10.1, IBM Fusion HCI versions 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx versions 2.8.2 through 2.10.0. The vulnerability arises from insecure default initialization of resources, specifically related to AMQStreams, a messaging platform component used within IBM Fusion products. The insecure default configuration allows AMQStreams to be exposed without requiring client authentication. This misconfiguration can enable an unauthenticated attacker to perform unauthorized actions on the messaging streams, potentially leading to high-impact consequences such as unauthorized data access or manipulation. The CVSS v3.1 base score is 8.7, indicating a high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N. This means the attack can be performed remotely over the network without privileges or user interaction, but requires high attack complexity. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is high, while availability is not impacted. No known exploits are currently reported in the wild, and no patches are listed yet. The underlying weakness is classified as CWE-1188, which relates to insecure default initialization of resources, highlighting a failure to securely configure components out-of-the-box. This vulnerability is critical for organizations using IBM Fusion products, especially those leveraging AMQStreams for messaging and data streaming, as it could allow attackers to bypass authentication controls and manipulate sensitive data streams.

Potential Impact

For European organizations, the impact of CVE-2025-36222 can be significant, particularly for enterprises relying on IBM Fusion and its variants for critical business operations involving data streaming and messaging. Unauthorized access to AMQStreams could lead to data breaches, exposure of sensitive information, or unauthorized data manipulation, undermining data integrity and confidentiality. This could affect sectors such as finance, manufacturing, telecommunications, and public services, where IBM Fusion is deployed for integration and data processing. The lack of authentication enforcement increases the risk of lateral movement within networks and potential escalation of attacks. Given the high confidentiality and integrity impact, organizations may face regulatory repercussions under GDPR if personal or sensitive data is compromised. Additionally, the complexity of the attack might limit exploitation to skilled threat actors, but the remote nature of the vulnerability means it could be exploited from outside the network perimeter, increasing the attack surface. The absence of availability impact reduces the risk of service disruption but does not diminish the severity of data compromise risks.

Mitigation Recommendations

To mitigate CVE-2025-36222, European organizations should: 1) Immediately review and audit the default configurations of IBM Fusion and related products to ensure AMQStreams are not exposed without client authentication. 2) Implement strict access controls and network segmentation to isolate AMQStreams components from untrusted networks. 3) Apply any available vendor patches or updates as soon as they are released; in the absence of patches, consider temporary workarounds such as disabling or restricting AMQStreams access. 4) Enable and enforce client authentication mechanisms on AMQStreams to prevent unauthorized access. 5) Monitor network traffic and logs for unusual or unauthorized access attempts to AMQStreams endpoints. 6) Conduct penetration testing and vulnerability assessments focusing on messaging infrastructure to identify and remediate insecure configurations. 7) Educate system administrators and security teams about the risks of insecure default configurations and the importance of secure initialization. 8) Coordinate with IBM support to obtain guidance and updates regarding this vulnerability. These steps go beyond generic advice by focusing on configuration auditing, network isolation, and proactive monitoring tailored to the messaging components involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:41.802Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c41d5dd839f9a306304f6b

Added to database: 9/12/2025, 1:17:17 PM

Last enriched: 9/12/2025, 1:17:38 PM

Last updated: 9/12/2025, 3:50:35 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats