Unauthorized config leak in IBM QRadar & Cloud Pak (v1.10.12.0-1.11.2.0)
CVE-2025-25022 Published on June 3, 2025

IBM QRadar Suite Software and IBM Cloud Pak for Security information disclosure
IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files.

Vendor Advisory NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Password in Configuration File

The software stores a password in a configuration file that might be accessible to actors who do not know the password. This can result in compromise of the system for which the password is used. An attacker could gain access to this file and learn the stored password or worse yet, change the password to one of their choosing.


Products Associated with CVE-2025-25022

stack.watch emails you whenever new vulnerabilities are published in IBM Cloud Pak For Security or IBM Qradar Suite. Just hit a watch button to start following.

 
 

Affected Versions

IBM QRadar Suite Software: IBM Cloud Pak for Security:

Exploit Probability

EPSS
0.06%
Percentile
18.62%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.