CVE-2025-14456
Authentication Bypass in IBM MQ Appliance 9.4.x Series
Publication date: 2026-03-03
Last updated on: 2026-03-05
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | mq_appliance | From 9.4.4.0 (inc) to 9.4.5.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects IBM MQ Appliance versions 9.4 CD through 9.4.4.0 to 9.4.4.1. It involves the use of weaker than expected cryptographic algorithms, classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). Because of this weakness, an attacker could potentially decrypt highly sensitive information transmitted or stored by the appliance.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily on confidentiality. An attacker exploiting this issue could decrypt highly sensitive information, potentially leading to data exposure. The CVSS v3.1 score is 5.9, indicating a moderate severity with a network attack vector, high attack complexity, no privileges or user interaction required, and no impact on integrity or availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or methods provided for identifying this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
The only effective mitigation is to promptly apply the recommended firmware update to IBM MQ Appliance version 9.4.5.0 or later.
There are no known workarounds or alternative mitigations other than updating the firmware.