CVE-2025-36376
Published: 17 February 2026
Summary
CVE-2025-36376 is a medium-severity Insufficient Session Expiration (CWE-613) vulnerability in Ibm Security Qradar Edr. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Web Session Cookie (T1550.004); ranked at the 18.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.
Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.
Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.
Terminating sessions and network connections upon completion prevents insufficient session expiration.
Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.
Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.
When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.
Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insufficient session expiration directly enables reuse of expired web session tokens for impersonation of valid accounts.
NVD Description
IBM Security QRadar EDR 3.12 through 3.12.23 does not invalidate session after a session expiration which could allow an authenticated user to impersonate another user on the system.
Deeper analysisAI
CVE-2025-36376 affects IBM Security QRadar EDR versions 3.12 through 3.12.23. The vulnerability stems from the application's failure to invalidate sessions after expiration, classified under CWE-613 (Insufficient Session Expiration). This flaw has a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, and low privileges required.
An authenticated user with low privileges can exploit this issue remotely over the network without user interaction. By continuing to use an expired session token belonging to another user, the attacker can impersonate that user, potentially gaining unauthorized access to limited confidential data, modifying system resources, or disrupting low-level availability.
IBM has published a security advisory at https://www.ibm.com/support/pages/node/7260390 providing details on the vulnerability and remediation steps. Security practitioners should consult this bulletin for patch availability and mitigation guidance specific to affected QRadar EDR deployments.
Details
- CWE(s)