Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36243: CWE-918 Server-Side Request Forgery (SSRF) in IBM Concert

0
Medium
VulnerabilityCVE-2025-36243cvecve-2025-36243cwe-918
Published: Tue Feb 17 2026 (02/17/2026, 18:56:44 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Concert

Description

IBM Concert 1.0.0 through 2.1.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 18:57:03 UTC

Technical Analysis

CVE-2025-36243 is a server-side request forgery (SSRF) vulnerability classified under CWE-918, affecting IBM Concert versions 1.0.0 through 2.1.0. SSRF vulnerabilities occur when an attacker can abuse a server to make HTTP or other protocol requests to unintended locations, often internal network resources that are otherwise inaccessible externally. In this case, the vulnerability allows an authenticated attacker with low privileges to craft requests that the IBM Concert server will execute on its behalf. This can enable attackers to perform network reconnaissance, access internal services, or pivot to other attacks such as exploiting internal vulnerabilities or exfiltrating data. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 5.4, indicating a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and limited confidentiality and integrity impacts without affecting availability. No patches or exploits are currently publicly available, but the vulnerability is publicly disclosed and should be addressed promptly. IBM Concert is a product used in enterprise environments, often integrated into broader IT and security operations, making this vulnerability relevant for organizations relying on it for orchestration or management tasks.

Potential Impact

The primary impact of CVE-2025-36243 is unauthorized internal network access and reconnaissance. By exploiting the SSRF vulnerability, attackers can send crafted requests to internal services that are not exposed externally, potentially discovering sensitive infrastructure details or accessing protected resources. This can lead to further exploitation, lateral movement, or data leakage within an organization's network. Although the direct confidentiality and integrity impact is rated low, the SSRF can serve as a stepping stone for more severe attacks. The vulnerability does not affect system availability directly but may compromise the security posture of affected organizations. Enterprises using IBM Concert in critical environments may face increased risk of targeted attacks, especially if internal network segmentation and monitoring are insufficient. The requirement for authentication limits exposure but does not eliminate risk, particularly in environments with weak credential management or insider threats.

Mitigation Recommendations

1. Apply patches or updates from IBM as soon as they become available for Concert versions 1.0.0 through 2.1.0 to remediate the SSRF vulnerability. 2. Implement strict access controls and network segmentation to limit IBM Concert server access to only trusted users and systems. 3. Monitor and log all outgoing requests from the IBM Concert server to detect anomalous or unauthorized internal network requests. 4. Enforce strong authentication and credential management policies to reduce the risk of attacker access to authenticated sessions. 5. Use web application firewalls (WAFs) or network-level controls to detect and block suspicious SSRF patterns or unusual request destinations. 6. Conduct regular security assessments and penetration testing focusing on SSRF and related vulnerabilities within the IBM Concert environment. 7. Educate administrators and users about the risks of SSRF and the importance of safeguarding credentials and access to the IBM Concert platform.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:43.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575bb80d747be2053771a

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 3/10/2026, 6:57:03 PM

Last updated: 4/5/2026, 3:41:47 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses