CVE-2025-36354
IBM Security Verify Access (formerly ISAM) vulnerability analysis and mitigation

Overview

IBM Security Verify Access and IBM Security Verify Access Docker versions 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 are affected by a security vulnerability identified as CVE-2025-36354. This vulnerability allows an unauthenticated user to execute arbitrary commands with lower user privileges on the system due to improper validation of user-supplied input. The vulnerability was disclosed on October 6, 2025, and has been assigned a CVSS Base Score of 7.3 (High) (IBM Security Bulletin).

Technical details

The vulnerability is classified under CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). It has been assigned a CVSS v3.1 Vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating network accessibility, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects both containerized and appliance deployments of the software (IBM Security Bulletin).

Impact

The exploitation of this vulnerability could lead to unauthorized command execution with lower user privileges on affected systems. The impact spans across confidentiality, integrity, and availability, each rated as Low in the CVSS scoring. This indicates potential unauthorized access to information, modification of system data, and potential service disruptions (Security Online).

Mitigation and workarounds

IBM has released security fixes in IBM Security Verify Access version 10.0.9.0-IF3 and IBM Verify Identity Access version 11.0.1.0-IF1. For container deployments, administrators can obtain the latest version by running the command 'docker pull icr.io/isva/verify-access:[tag]' or 'docker pull icr.io/ivia/verify-access:[tag]' where [tag] is the latest published version. No workarounds have been provided as alternatives to patching (IBM Security Bulletin).

Community reactions

The vulnerability has drawn attention from security researchers, including acknowledgment of coordinated vulnerability disclosure by researchers from various institutions such as COSIC at KU Leuven, University of Lubeck, CISPA Helmholtz Center for Information Security, University of Birmingham, and DistriNet at KU Leuven (IBM Security Bulletin).

Additional resources


SourceThis report was generated using AI

Related IBM Security Verify Access (formerly ISAM) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-36356CRITICAL9.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2025-36355HIGH8.5
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2025-36354HIGH7.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2024-56343MEDIUM6.5
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoJun 06, 2025
CVE-2025-0163MEDIUM5.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoYesJun 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management