CVE Alert: CVE-2025-36222 – IBM – Fusion

CVE-2025-36222

HIGHNo exploitation known

IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.

CVSS v3.1 (8.7)
AV NETWORK · AC HIGH · PR NONE · UI NONE · S CHANGED
Vendor
IBM, IBM, IBM
Product
Fusion, Fusion HCI, Fusion HCI for watsonx
Versions
2.2.0 lte 2.10.1 | 2.2.0 lte 2.10.0 | 2.8.2 lte 2.10.0
CWE
CWE-1188, CWE-1188 Insecure Default Initialization of Resource
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Published
2025-09-11T20:44:06.696Z
Updated
2025-09-11T20:44:06.696Z
cpe:2.3:a:ibm:storage_fusion:2.2.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:storage_fusion:2.10.1:*:*:*:*:*:*:*cpe:2.3:a:ibm:storage_fusion_hci:2.2.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:storage_fusion_hci:2.10.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:storage_fusion_hci_for_watsonx:2.8.2:*:*:*:*:*:*:*cpe:2.3:a:ibm:storage_fusion_hci_for_watsonx:2.10.0:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk. Remote unauthenticated access to AMQStreams could enable unauthorized actions; no explicit KEV/SSVC exploitation state reported.

Why this matters

Exposed messaging infrastructure can expose confidential data and enable manipulation or exfiltration of messages. Attackers could leverage unauthenticated access to pivot into other Fusion components, disrupt operations, or escalate to broader infrastructure.

Most likely attack path

Network access to the AMQStreams broker is sufficient; no privileges or user interaction required. With insecure defaults, an attacker could perform publish/subscribe or administrative actions without credentials, potentially altering topology or data flows. The scope-change aspect suggests potential impact beyond the broker itself, enabling lateral movement to related services.

Who is most exposed

Typical deployments of IBM Fusion/Fusion HCI in on‑premise or private/hybrid environments where broker endpoints may be exposed or inadequately network-segmented. Organisations with open WAN access or lax access controls are particularly at risk.

Detection ideas

  • Unauthenticated connections to broker endpoints from unusual/unknown sources
  • Creation or modification of topics/queues without credentials
  • Sudden spike in messaging activity or anomalous admin API use
  • Absence or misconfiguration of TLS/client authentication signals in broker logs
  • Elevated, unexpected changes in Fusion components tied to messaging

Mitigation and prioritisation

  • Patch upgrade to the advised versions (2.11.0) and verify successful remediation
  • Enforce authentication and TLS for AMQStreams; disable anonymous access
  • Tighten network controls: restrict broker access to trusted networks, apply firewall rules
  • Implement strong RBAC, audit logging, and credential rotation; align with change-management processes
  • If KEV exists or EPSS ≥ 0.5, treat as priority 1; otherwise proceed as high priority with fixed-window patching.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.