CVE Alert: CVE-2025-36354 – IBM – Security Verify Access Appliance

CVE-2025-36354

HIGHNo exploitation known

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow an unauthenticated user to execute arbitrary commands with lower user privileges on the system due to improper validation of user supplied input.

CVSS v3.1 (7.3)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
IBM, IBM
Product
Security Verify Access Appliance, Security Verify Access Docker
Versions
10.0.0.0 lte 10.0.9.0 IF2 | 11.0.0.0 lte 11.0.1.0 | 10.0.0.0 lte 10.0.9.0 IF2 | 11.0.0.0 lte 11.0.1.0
CWE
CWE-78, CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Published
2025-10-06T16:53:43.179Z
Updated
2025-10-06T19:58:39.023Z
cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:10.0.9.0:interm_fix2:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:11.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:11.0.1.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:10.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:10.0.9.0:interm_fix2:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:11.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:11.0.1.0:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk due to unauthenticated remote command execution over the network; exploitation activity is not confirmed in KEV/SSVC data, but the vulnerability enables immediate command execution without user interaction.

Why this matters

Attacks could lead to full system compromise, data exposure, or service disruption affecting remote access infrastructure. Given no authentication required, attacker goals include establishing persistence, moving laterally within the environment, or mounting further payloads with limited privileges.

Most likely attack path

An attacker can reach exposed appliances over the network and trigger input handling flaws to run arbitrary commands with low privileges. With no user interaction or credentials required, initial access is straightforward; limited initial privileges may constrain impact but can enable follow-on escalation or data access if combined with other footholds.

Who is most exposed

Exposed, internet-facing deployments of the appliance and any containerised variants are most at risk, especially in poorly segmented networks or where management interfaces are reachable from untrusted networks.

Detection ideas

  • Unusual or newly spawned command processes linked to the appliance service.
  • Web server or API logs showing anomalous input patterns indicative of command injection.
  • Unexpected outbound connections or shells created from the appliance context.
  • Privilege-escalation or file-system changes following access attempts.
  • IDS/IPS alerts for crafted input attempting command execution patterns.

Mitigation and prioritisation

  • Apply the vendor advisory and upgrade to the fixed version as soon as possible.
  • If patching is constrained, implement compensating controls: restrict external access to management interfaces, enforce network segmentation, and place a WAF in front of the appliance.
  • Harden input validation and disable risky features that enable direct command execution.
  • Monitor and alert on anomalous command activity and rapid configuration changes.
  • Change-management: test patch in staging, back up critical data, and schedule a rapid production rollout.
  • If KEV or EPSS data indicate active exploitation, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.