CVE-2025-36355

IBM · IBM Security Verify Access and IBM Security Verify Access Docker

A high-severity vulnerability has been identified in IBM Security Verify Access products, which could allow a remote, unauthenticated attacker to bypass authentication controls.

Executive summary

A high-severity vulnerability has been identified in IBM Security Verify Access products, which could allow a remote, unauthenticated attacker to bypass authentication controls. Successful exploitation of this flaw could grant unauthorized access to protected resources, leading to potential data breaches, user impersonation, and compromise of critical business applications. Organizations are urged to apply vendor patches immediately to mitigate this significant security risk.

Vulnerability

This vulnerability is an authentication bypass flaw resulting from improper validation of authentication requests in the web reverse proxy component. An unauthenticated remote attacker can craft a specially designed HTTP request that tricks the system into granting access without proper credentials. The exploit takes advantage of a parsing error in the security token handling mechanism, allowing the attacker to impersonate legitimate users and access sensitive backend applications and resources protected by Security Verify Access.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.5. A successful exploit would have a severe impact on the business, as IBM Security Verify Access is a critical component for controlling access to enterprise resources. The potential consequences include unauthorized access to sensitive corporate data, customer information, and internal systems. This could lead to significant financial loss, regulatory penalties, reputational damage, and a complete loss of trust in the organization's security posture.

Remediation

Immediate Action: Apply the security updates provided by IBM to all affected systems immediately. Prioritize patching for internet-facing instances of IBM Security Verify Access. After patching, it is crucial to monitor for any signs of exploitation attempts by closely reviewing system and access logs for anomalous activity.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes scrutinizing authentication logs for unusual or unexpected successful logins, particularly from unfamiliar IP addresses or geolocations. Monitor web server and application logs for malformed HTTP requests or authentication tokens that deviate from standard patterns.

Compensating Controls: If immediate patching is not feasible, consider implementing compensating controls. Restrict network access to the management interfaces of the affected appliances to a trusted internal network. If possible, deploy Web Application Firewall (WAF) rules designed to inspect and block the specific malicious request patterns associated with this exploit.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This is a high-impact vulnerability in a critical enterprise security product that allows for a complete bypass of authentication controls. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants immediate and decisive action. Organizations are strongly advised to treat this as a critical priority and apply the vendor-supplied patches to all affected systems without delay. Proactive monitoring should be implemented to ensure early detection of any potential exploitation attempts.