Cyber Posture

CVE-2025-36377

Medium

Published: 17 February 2026

Published
17 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.3th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-36377 is a medium-severity Insufficient Session Expiration (CWE-613) vulnerability in Ibm Qradar Edr. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Web Session Cookie (T1550.004); ranked at the 18.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Web Session Cookie (T1550.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

Insufficient session expiration (CWE-613) directly enables reuse of expired web session tokens for impersonation, mapping to use of web session cookies as alternate authentication material.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Security QRadar EDR 3.12 through 3.12.23 does not invalidate session after a session expiration which could allow an authenticated user to impersonate another user on the system.

Deeper analysisAI

IBM Security QRadar EDR versions 3.12 through 3.12.23 contain a vulnerability tracked as CVE-2025-36377, where the application fails to invalidate sessions after expiration. This issue, classified under CWE-613 (Insufficient Session Expiration), carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), rated as medium severity. An authenticated user could exploit this flaw to impersonate another user on the system by continuing to use an expired session token.

The attack requires low-privileged authentication (PR:L) and network access (AV:N) with low complexity (AC:L) and no user interaction (UI:N). A malicious low-privileged user could leverage a previously valid but expired session to perform actions as another user, potentially leading to limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The scope remains unchanged (S:U), making it feasible in environments where session management is critical for access control.

IBM has published an advisory at https://www.ibm.com/support/pages/node/7260390 addressing this vulnerability, including details on mitigation and available patches for affected QRadar EDR versions. Security practitioners should review the advisory for upgrade paths beyond version 3.12.23 to invalidate sessions properly and prevent unauthorized impersonation.

Details

CWE(s)

Affected Products

ibm
qradar edr
3.12.0 — 3.12.24

CVEs Like This One

CVE-2025-36379Same product: Ibm Qradar Edr
CVE-2025-36376Same vendor: Ibm
CVE-2025-22386Shared CWE-613
CVE-2025-59786Shared CWE-613
CVE-2026-25476Shared CWE-613
CVE-2026-34828Shared CWE-613
CVE-2025-57735Shared CWE-613
CVE-2024-56340Same vendor: Ibm
CVE-2024-43187Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm

References