IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These flaws, which vary in severity from medium to critical, can lead to remote code execution, information disclosure, and denial of service (DoS) attacks.
The bulletin lists five security vulnerabilities affecting versions 1.10.0.0 through 1.11.2.0 of IBM Cloud Pak for Security and QRadar Suite Software:
CVE-2025-25022 (CVSS 9.6 – Critical):
This serious vulnerability lets unauthenticated attackers access sensitive information in configuration files, potentially leading to system compromise or privilege escalation.
CVE-2025-25021 (CVSS 7.2 – High):
This flaw allows privileged users to run arbitrary code due to poor case management in script creation. It arises from faulty code generation, creating a risk of exploitation in administrative tasks.
CVE-2025-25020 (CVSS 6.5 – Medium):
A DoS vulnerability lets authenticated users crash services by sending malformed data through the API, as the input validation doesn’t fully sanitize some payloads.
CVE-2025-25019 (CVSS 4.8 – Medium):
The session management flaw in QRadar SIEM fails to properly invalidate sessions upon logout, potentially allowing session hijacking where an attacker can impersonate another user.
CVE-2025-1334 (CVSS 4.0 – Medium):
The software allows storing web content that can be accessed by other users on the system, which is a concern in multi-user environments where data privacy is important.
The issues impact the following product versions:
IBM Cloud Pak for Security: 1.10.0.0 to 1.10.11.0
QRadar Suite Software: 1.10.12.0 to 1.11.2.0
IBM advises upgrading to version 1.11.3.0 or later to address all five vulnerabilities. They have provided detailed guidance for the upgrade and installation of the patched versions.
Installation Instructions
Upgrade Instructions
Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks