Multiple high-severity vulnerabilities in IBM QRadar SIEM could allow attackers to execute arbitrary commands and access sensitive data.
The most critical flaw, tracked as CVE-2025-33117, carries a CVSS score of 9.1 and enables privileged users to upload malicious files that can execute arbitrary commands on affected systems.
Organizations running IBM QRadar SIEM versions 7.5 through 7.5.0 UP12 IF01 are urged to immediately update to the latest patch to prevent potential security breaches.
Critical QRadar File Path Vulnerability (CVE-2025-33117)
The most severe vulnerability, CVE-2025-33117, poses an immediate threat to enterprise security infrastructures.
This flaw is classified under CWE-73: External Control of File Name or Path and allows privileged users to modify configuration files, enabling the upload of malicious autoupdate files.
The vulnerabilityβs CVSS vector (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) indicates network-based exploitation with low attack complexity, requiring high privileges but no user interaction.
Security researchers have demonstrated that attackers with elevated access can leverage this vulnerability to gain complete system control, potentially compromising entire SIEM deployments.
The scope change (S:C) in the CVSS vector indicates that successful exploitation can impact resources beyond the vulnerable component, making this particularly dangerous in enterprise environments where QRadar manages critical security data.
CVEs | Affected Products | Impact | Exploit Prerequisites | CVSS 3.1 Score |
CVE-2025-33117 | IBM QRadar SIEM 7.5 β 7.5.0 UP12 IF01 | Arbitrary command execution | Privileged user access (admin-level) | 9.1 (Critical) |
CVE-2025-33121 | IBM QRadar SIEM 7.5 β 7.5.0 UP12 IF01 | Sensitive data exposure | Authenticated user access | 7.1 (High) |
CVE-2025-36050 | IBM QRadar SIEM 7.5 β 7.5.0 UP12 IF01 | Unauthorized access to sensitive information | Local system access (no authentication) | 6.2 (Medium) |
Patch Availability >>
IBM has released QRadar 7.5.0 UP12 IF02 as the definitive fix for all identified vulnerabilities. Organizations must prioritize this update given the critical nature of these flaws, particularly the arbitrary command execution capability.
The security bulletin provides no workarounds or mitigations, making immediate patching the only viable defense strategy.