CVE-2025-36363
Published: 03 March 2026
Summary
CVE-2025-36363 is a medium-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Ibm Devops Plan. Its CVSS base score is 5.9 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Password Guessing (T1110.001); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
This control directly enforces limits on consecutive invalid logon attempts and automatic response (e.g., lockout) to prevent brute-force exploitation of authentication mechanisms.
Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a missing account lockout (CWE-307) that directly enables remote brute-force login attempts against credentials.
NVD Description
IBM DevOps Plan 3.0.0 through 3.0.5 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.
Deeper analysisAI
CVE-2025-36363 is a vulnerability in IBM DevOps Plan versions 3.0.0 through 3.0.5 stemming from an inadequate account lockout setting (CWE-307). This flaw enables a remote attacker to brute force account credentials due to insufficient protections against repeated login attempts. The issue carries a CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating network accessibility, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact.
A remote attacker without privileges can exploit this vulnerability by conducting brute force attacks against login credentials. Success grants unauthorized access to sensitive account data, potentially compromising confidentiality, though the high attack complexity limits feasibility for low-sophistication adversaries.
IBM has issued an advisory detailing mitigations at https://www.ibm.com/support/pages/node/7261934. Security practitioners should consult this page for patch information and recommended configurations to enforce proper account lockout mechanisms.
Details
- CWE(s)