SB2025072303 - Multiple vulnerabilities in IBM Security QRadar Network Threat Analytics 



SB2025072303 - Multiple vulnerabilities in IBM Security QRadar Network Threat Analytics

Published: July 23, 2025

Security Bulletin ID SB2025072303
Severity
High
Patch available
YES
Number of vulnerabilities 13
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 23% Medium 62% Low 15%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 13 secuirty vulnerabilities.


1) Inefficient regular expression complexity (CVE-ID: CVE-2023-26115)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.


2) Uncontrolled Recursion (CVE-ID: CVE-2025-4565)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

the vulnerability exists due to uncontrolled recursion when parsing untrusted data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags. A remote attacker send specially crafted input to the application and can perform a denial of service attack. 


3) Out-of-bounds read (CVE-ID: CVE-2024-5629)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the bson module. A remote attacker can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


4) Incorrect Regular Expression (CVE-ID: CVE-2022-25883)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation when processing regular expressions. A remote attacker can pass specially crafted data to the application via the new Range function and perform regular expression denial of service (ReDos) attack.


5) Open redirect (CVE-ID: CVE-2024-29041)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in malformed URLs. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


6) Resource exhaustion (CVE-ID: CVE-2023-46298)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to Next.js lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


7) Prototype pollution (CVE-ID: CVE-2023-26136)

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.


8) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2024-6827)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. A remote attacker can send a specially crafted HTTP request to the server and initiate cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.


9) Input validation error (CVE-ID: CVE-2023-32305)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to leveraging missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions and could lead to arbitrary code execution or data access on the underlying host as the `postgres` user.


10) Prototype pollution (CVE-ID: CVE-2022-24999)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation. A remote attacker can send a specially crafted request and perform a denial of service (DoS) attack.



11) Incorrect Comparison (CVE-ID: CVE-2023-45133)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists in '@babel/traverse' and `babel-traverse`. A local user can execute arbitrary code during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods.


12) Input validation error (CVE-ID: CVE-2023-44270)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to insufficient validation of external CSS files when parsing the "\r" character. A remote attacker can pass specially crafted input to the application and perform spoofing attack.


13) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2024-1135)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests when handling Transfer-Encoding headers. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


Remediation

Install update from vendor's website.