CVE-2025-33119
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-12-15
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
| ibm | qradar_security_information_and_event_manager | 7.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-260 | The product stores a password in a configuration file that might be accessible to actors who do not know the password. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM QRadar SIEM versions 7.5 through 7.5.0 UP14 involves user credentials being stored in configuration files within source control. These stored credentials can be accessed and read by any authenticated user, potentially exposing sensitive authentication information.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of user credentials to authenticated users who should not have access to them. This can increase the risk of credential compromise, unauthorized access, and potential misuse of the system by attackers or malicious insiders.