Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36249: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management

0
Low
VulnerabilityCVE-2025-36249cvecve-2025-36249cwe-614
Published: Fri Oct 31 2025 (10/31/2025, 13:05:32 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Jazz for Service Management

Description

IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.

AI-Powered Analysis

AILast updated: 10/31/2025, 13:44:51 UTC

Technical Analysis

CVE-2025-36249 identifies a security vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25, where session cookies and authorization tokens are transmitted without the 'Secure' attribute set. The 'Secure' attribute instructs browsers to only send cookies over HTTPS connections, preventing exposure over unencrypted HTTP traffic. Without this attribute, if a user accesses an HTTP link—either through a maliciously crafted link or a compromised website—the browser will send the session cookie over an unencrypted channel. An attacker monitoring network traffic on the same network segment can intercept these cookies, potentially allowing session hijacking or unauthorized access. The vulnerability does not require user authentication or interaction beyond clicking a link, but exploitation complexity is high because the attacker must induce the user to visit an HTTP URL. The CVSS 3.1 score is 3.7 (low severity), reflecting limited confidentiality impact and no impact on integrity or availability. No public exploits are known, and IBM has not yet released patches. This vulnerability falls under CWE-614, which concerns sensitive cookies transmitted without the 'Secure' flag, a common web security misconfiguration. The issue highlights the importance of enforcing HTTPS and proper cookie security attributes in web applications handling sensitive sessions.

Potential Impact

For European organizations using IBM Jazz for Service Management, this vulnerability could lead to unauthorized disclosure of session cookies if users are tricked into visiting HTTP links. The primary impact is confidentiality loss, potentially enabling attackers to hijack user sessions and gain unauthorized access to service management functions. This could disrupt IT service operations, expose sensitive management data, or allow attackers to manipulate service workflows. However, the impact is limited by the high complexity of attack execution and the requirement that users access insecure HTTP links. Organizations with strict network segmentation or HTTPS enforcement may be less affected. Still, environments where users access IBM Jazz from untrusted networks or where HTTP links are common pose a higher risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for further attacks if exploited. Given the critical role of service management platforms in IT operations, even low-severity vulnerabilities warrant timely remediation to maintain operational security.

Mitigation Recommendations

To mitigate CVE-2025-36249, organizations should immediately verify and enforce that all session cookies in IBM Jazz for Service Management have the 'Secure' attribute set, ensuring cookies are only transmitted over HTTPS. This may require configuration changes or updates once IBM releases patches. In the interim, enforce strict HTTPS usage by redirecting all HTTP requests to HTTPS and disabling HTTP access to the service management portal. Implement HTTP Strict Transport Security (HSTS) headers to prevent protocol downgrade attacks. Educate users to avoid clicking on HTTP links related to IBM Jazz and to report suspicious URLs. Network-level controls such as blocking outbound HTTP traffic to the service management domain can also reduce risk. Regularly monitor network traffic for unencrypted cookie transmissions and review logs for unusual session activity. Finally, maintain up-to-date software versions and apply IBM patches promptly when available to address this and other vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:43.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6904bd22f54b4a89977ab6d9

Added to database: 10/31/2025, 1:44:02 PM

Last enriched: 10/31/2025, 1:44:51 PM

Last updated: 11/1/2025, 9:29:35 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats