CVE-2025-36249: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI Analysis
Technical Summary
CVE-2025-36249 identifies a security vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25, where session cookies and authorization tokens are transmitted without the 'Secure' attribute set. The 'Secure' attribute instructs browsers to only send cookies over HTTPS connections, preventing exposure over unencrypted HTTP traffic. Without this attribute, if a user accesses an HTTP link—either through a maliciously crafted link or a compromised website—the browser will send the session cookie over an unencrypted channel. An attacker monitoring network traffic on the same network segment can intercept these cookies, potentially allowing session hijacking or unauthorized access. The vulnerability does not require user authentication or interaction beyond clicking a link, but exploitation complexity is high because the attacker must induce the user to visit an HTTP URL. The CVSS 3.1 score is 3.7 (low severity), reflecting limited confidentiality impact and no impact on integrity or availability. No public exploits are known, and IBM has not yet released patches. This vulnerability falls under CWE-614, which concerns sensitive cookies transmitted without the 'Secure' flag, a common web security misconfiguration. The issue highlights the importance of enforcing HTTPS and proper cookie security attributes in web applications handling sensitive sessions.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability could lead to unauthorized disclosure of session cookies if users are tricked into visiting HTTP links. The primary impact is confidentiality loss, potentially enabling attackers to hijack user sessions and gain unauthorized access to service management functions. This could disrupt IT service operations, expose sensitive management data, or allow attackers to manipulate service workflows. However, the impact is limited by the high complexity of attack execution and the requirement that users access insecure HTTP links. Organizations with strict network segmentation or HTTPS enforcement may be less affected. Still, environments where users access IBM Jazz from untrusted networks or where HTTP links are common pose a higher risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for further attacks if exploited. Given the critical role of service management platforms in IT operations, even low-severity vulnerabilities warrant timely remediation to maintain operational security.
Mitigation Recommendations
To mitigate CVE-2025-36249, organizations should immediately verify and enforce that all session cookies in IBM Jazz for Service Management have the 'Secure' attribute set, ensuring cookies are only transmitted over HTTPS. This may require configuration changes or updates once IBM releases patches. In the interim, enforce strict HTTPS usage by redirecting all HTTP requests to HTTPS and disabling HTTP access to the service management portal. Implement HTTP Strict Transport Security (HSTS) headers to prevent protocol downgrade attacks. Educate users to avoid clicking on HTTP links related to IBM Jazz and to report suspicious URLs. Network-level controls such as blocking outbound HTTP traffic to the service management domain can also reduce risk. Regularly monitor network traffic for unencrypted cookie transmissions and review logs for unusual session activity. Finally, maintain up-to-date software versions and apply IBM patches promptly when available to address this and other vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-36249: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
Description
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI-Powered Analysis
Technical Analysis
CVE-2025-36249 identifies a security vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25, where session cookies and authorization tokens are transmitted without the 'Secure' attribute set. The 'Secure' attribute instructs browsers to only send cookies over HTTPS connections, preventing exposure over unencrypted HTTP traffic. Without this attribute, if a user accesses an HTTP link—either through a maliciously crafted link or a compromised website—the browser will send the session cookie over an unencrypted channel. An attacker monitoring network traffic on the same network segment can intercept these cookies, potentially allowing session hijacking or unauthorized access. The vulnerability does not require user authentication or interaction beyond clicking a link, but exploitation complexity is high because the attacker must induce the user to visit an HTTP URL. The CVSS 3.1 score is 3.7 (low severity), reflecting limited confidentiality impact and no impact on integrity or availability. No public exploits are known, and IBM has not yet released patches. This vulnerability falls under CWE-614, which concerns sensitive cookies transmitted without the 'Secure' flag, a common web security misconfiguration. The issue highlights the importance of enforcing HTTPS and proper cookie security attributes in web applications handling sensitive sessions.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability could lead to unauthorized disclosure of session cookies if users are tricked into visiting HTTP links. The primary impact is confidentiality loss, potentially enabling attackers to hijack user sessions and gain unauthorized access to service management functions. This could disrupt IT service operations, expose sensitive management data, or allow attackers to manipulate service workflows. However, the impact is limited by the high complexity of attack execution and the requirement that users access insecure HTTP links. Organizations with strict network segmentation or HTTPS enforcement may be less affected. Still, environments where users access IBM Jazz from untrusted networks or where HTTP links are common pose a higher risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for further attacks if exploited. Given the critical role of service management platforms in IT operations, even low-severity vulnerabilities warrant timely remediation to maintain operational security.
Mitigation Recommendations
To mitigate CVE-2025-36249, organizations should immediately verify and enforce that all session cookies in IBM Jazz for Service Management have the 'Secure' attribute set, ensuring cookies are only transmitted over HTTPS. This may require configuration changes or updates once IBM releases patches. In the interim, enforce strict HTTPS usage by redirecting all HTTP requests to HTTPS and disabling HTTP access to the service management portal. Implement HTTP Strict Transport Security (HSTS) headers to prevent protocol downgrade attacks. Educate users to avoid clicking on HTTP links related to IBM Jazz and to report suspicious URLs. Network-level controls such as blocking outbound HTTP traffic to the service management domain can also reduce risk. Regularly monitor network traffic for unencrypted cookie transmissions and review logs for unusual session activity. Finally, maintain up-to-date software versions and apply IBM patches promptly when available to address this and other vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:43.936Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6904bd22f54b4a89977ab6d9
Added to database: 10/31/2025, 1:44:02 PM
Last enriched: 10/31/2025, 1:44:51 PM
Last updated: 11/1/2025, 9:29:35 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalCVE-2025-12600: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.