CVE-2025-36351: CWE-284 Authentication Bypass Using an Alternate Path or Channel in IBM License Metric Tool
IBM License Metric Tool 9.2.0 through 9.2.40 could allow an authenticated user to bypass access controls in the REST API interface and perform unauthorized actions.
AI Analysis
Technical Summary
CVE-2025-36351 is a medium-severity vulnerability identified in IBM License Metric Tool versions 9.2.0 through 9.2.40. The vulnerability stems from improper access control enforcement in the REST API interface of the product. Specifically, it allows an authenticated user to bypass intended access restrictions and perform unauthorized actions. The underlying weakness is classified under CWE-284, which refers to authentication bypass using an alternate path or channel. This means that although the user has some level of authentication, the system fails to properly verify their authorization for certain API operations, potentially allowing privilege escalation or unauthorized modifications. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the impact primarily on integrity (unauthorized actions) but no direct impact on confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that remediation may still be pending or in development. The vulnerability affects a critical enterprise tool used for software license management, which is often integrated into IT asset management and compliance workflows.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in environments where IBM License Metric Tool is deployed to manage software licenses and compliance. Unauthorized actions via the REST API could lead to inaccurate license reporting, manipulation of license entitlements, or disruption of compliance audits. This could result in financial penalties due to non-compliance, legal liabilities, or operational disruptions if license enforcement mechanisms are circumvented. Additionally, unauthorized changes might be leveraged as a foothold for further lateral movement within enterprise networks, especially if the License Metric Tool is integrated with other IT management systems. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact on license data and management processes can undermine trust in software asset management and compliance, which is critical for regulated industries prevalent in Europe such as finance, healthcare, and government sectors.
Mitigation Recommendations
Given the absence of an official patch link, European organizations should take immediate compensating controls to mitigate risk. These include: 1) Restricting network access to the IBM License Metric Tool REST API interface to trusted administrative networks only, using firewalls or network segmentation. 2) Enforcing strict authentication and authorization policies, ensuring that only necessary users have access and that roles are properly assigned and audited. 3) Monitoring and logging all REST API calls for unusual or unauthorized activity, with alerts configured for anomalous access patterns. 4) Temporarily disabling or limiting REST API functionality if feasible until a patch is available. 5) Engaging with IBM support to obtain timelines for patches or workarounds and applying them promptly once released. 6) Conducting internal audits of license data integrity to detect any unauthorized changes. These steps go beyond generic advice by focusing on access control hardening, monitoring, and operational controls tailored to the affected product and vulnerability vector.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-36351: CWE-284 Authentication Bypass Using an Alternate Path or Channel in IBM License Metric Tool
Description
IBM License Metric Tool 9.2.0 through 9.2.40 could allow an authenticated user to bypass access controls in the REST API interface and perform unauthorized actions.
AI-Powered Analysis
Technical Analysis
CVE-2025-36351 is a medium-severity vulnerability identified in IBM License Metric Tool versions 9.2.0 through 9.2.40. The vulnerability stems from improper access control enforcement in the REST API interface of the product. Specifically, it allows an authenticated user to bypass intended access restrictions and perform unauthorized actions. The underlying weakness is classified under CWE-284, which refers to authentication bypass using an alternate path or channel. This means that although the user has some level of authentication, the system fails to properly verify their authorization for certain API operations, potentially allowing privilege escalation or unauthorized modifications. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the impact primarily on integrity (unauthorized actions) but no direct impact on confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that remediation may still be pending or in development. The vulnerability affects a critical enterprise tool used for software license management, which is often integrated into IT asset management and compliance workflows.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in environments where IBM License Metric Tool is deployed to manage software licenses and compliance. Unauthorized actions via the REST API could lead to inaccurate license reporting, manipulation of license entitlements, or disruption of compliance audits. This could result in financial penalties due to non-compliance, legal liabilities, or operational disruptions if license enforcement mechanisms are circumvented. Additionally, unauthorized changes might be leveraged as a foothold for further lateral movement within enterprise networks, especially if the License Metric Tool is integrated with other IT management systems. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact on license data and management processes can undermine trust in software asset management and compliance, which is critical for regulated industries prevalent in Europe such as finance, healthcare, and government sectors.
Mitigation Recommendations
Given the absence of an official patch link, European organizations should take immediate compensating controls to mitigate risk. These include: 1) Restricting network access to the IBM License Metric Tool REST API interface to trusted administrative networks only, using firewalls or network segmentation. 2) Enforcing strict authentication and authorization policies, ensuring that only necessary users have access and that roles are properly assigned and audited. 3) Monitoring and logging all REST API calls for unusual or unauthorized activity, with alerts configured for anomalous access patterns. 4) Temporarily disabling or limiting REST API functionality if feasible until a patch is available. 5) Engaging with IBM support to obtain timelines for patches or workarounds and applying them promptly once released. 6) Conducting internal audits of license data integrity to detect any unauthorized changes. These steps go beyond generic advice by focusing on access control hardening, monitoring, and operational controls tailored to the affected product and vulnerability vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:54.209Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68da982a15f3c5a417dc16a9
Added to database: 9/29/2025, 2:31:06 PM
Last enriched: 9/29/2025, 2:31:57 PM
Last updated: 9/30/2025, 4:59:57 PM
Views: 9
Related Threats
Remote Code Execution and Authentication Bypass in Materialise OrthoView (CVE-2025-23049)
MediumCVE-2025-36262: CWE-1286 Improper Validation of Syntactic Correctness of Input in IBM Planning Analytics Local
MediumCVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
MediumCVE-2025-10659: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in MegaSys Telenium Online Web Application:
CriticalCVE-2025-41098: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.