IBM reports multiple flaws in QRadar SIEM, at least one critical
Take action: If you're running IBM QRadar SIEM, plan an update to version 7.5.0 UP12 IF02. There is at least one critical patch to fix, but it's not a panic mode since it does require authentication and privileges within the system to be exploited. Just don't ignore the patch, someone will eventually abuse the flaws.
Learn More
IBM is reporting multiple security vulnerabilities affecting its QRadar SIEM platform.
Vulnerabilities summary
- CVE-2025-33117 (CVSS score 9.1), External Control of File Name or Path, allows privileged users to modify configuration files and upload malicious autoupdate files that can execute arbitrary commands on affected QRadar SIEM systems. If exploited, this flaw could provide attackers with a foothold to compromise the network or steal sensitive data.
- CVE-2025-33121 (CVSS score 7.1) - An XML External Entity (XXE) injection vulnerability that occurs when the QRadar SIEM processes XML data. It allows authenticated users to expose sensitive information or exhaust memory resources through maliciously crafted XML data.
- CVE-2025-36050 (CVSS score 6.2) - A vulnerability involving the inappropriate storage of sensitive information in log files that can be accessed by local users.
The vulnerabilities affect IBM QRadar SIEM versions 7.5 through 7.5.0 UP12 IF01.
IBM has addressed these security issues in QRadar SIEM version 7.5.0 UP12 IF02. The the company strongly encourages customers to update their systems promptly to prevent potential exploitation.
IBM has not provided any workarounds or mitigations for these vulnerabilities.