CVE Alert: CVE-2025-36355 – IBM – Security Verify Access Appliance

CVE-2025-36355

HIGHNo exploitation known

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.

CVSS v3.1 (8.5)
AV LOCAL · AC LOW · PR NONE · UI NONE · S CHANGED
Vendor
IBM, IBM
Product
Security Verify Access Appliance, Security Verify Access Docker
Versions
10.0.0.0 lte 10.0.9.0 IF2 | 11.0.0.0 lte 11.0.1.0 | 10.0.0.0 lte 10.0.9.0 IF2 | 11.0.0.0 lte 11.0.1.0
CWE
CWE-829, CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Published
2025-10-06T16:52:30.705Z
Updated
2025-10-06T19:59:35.611Z
cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:10.0.9.0:interm_fix2:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:11.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access:11.0.1.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:10.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:10.0.9.0:interm_fix2:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:11.0.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:security_verify_access_docker:11.0.1.0:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk: a locally authenticated user can execute malicious scripts with elevated impact; currently no known active exploitation, but the combination of high base score and changed scope warrants prompt remediation.

Why this matters

If exploited, an attacker could run code within the affected IBM Security Verify Access components, exposing confidential data and undermining integrity. The changed scope implies potential to affect adjacent services or components, increasing blast radius in enterprise deployments.

Most likely attack path

  • Preconditions: local access with a valid account; no user interaction required.
  • Attacker objective: execute scripts from outside the component’s normal control sphere, with access to data and processes associated with the vulnerable host.
  • Lateral movement potential: limited by local access, but the changed scope indicates risk of broader impact within connected systems or containers.

Who is most exposed

On-premises appliances and Docker deployments of IBM Security Verify Access, especially where management interfaces are reachable from internal networks or VPN-secured segments.

Detection ideas

  • Unexpected script execution events on the appliance/container host.
  • New or modified scripts/files in application directories.
  • Local-login events from non-administrative users outside normal windows, or unusual login patterns to management interfaces.
  • Anomalous process trees or child processes spawned by the vulnerable component.
  • Elevated privilege or script execution alerts tied to the Verify Access environment.

Mitigation and prioritisation

  • Apply vendor patch upgrade to fixed builds per IBM advisory; verify coverage across all appliances and Docker images.
  • Enforce strict local-access controls: limit management interfaces to trusted networks, disable unnecessary local accounts, require MFA where feasible.
  • Implement application allowlisting and restrict script execution within the affected components.
  • Enable enhanced logging and EDR coverage for the Verify Access processes; monitor for anomalous script/process activity.
  • Plan patching in a controlled change window with backups and a rollback path; if patching is delayed, implement compensating controls and isolate affected systems.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.