Vulnerability Note VU#722868

IBM QRadar SIEM command injection vulnerability

Original Release date: 05 Jun 2013 | Last revised: 05 Jun 2013


IBM QRadar SIEM software contains a command injection vulnerability that allows an authenticated user to execute operating system commands on the QRadar device.


The IBM security bulletin for CVE-2013-2970 states:

    A command injection vulnerability has been discovered within the IBM QRadar SIEM software that allows an authenticated user to execute operating system commands as a limited access user on the QRadar device. This access could be used to gain remote shell access as that webservices user. Even though authenticated users of the QRadar SIEM do not necessarily have shell access, action should be taken to ensure this issue is patched as soon as possible.

    The attack can be conducted over the internet. Some degree of specialized knowledge and techniques are required to conduct this attack. Multiple authentication attempts are required for this attack. An exploit may have a limited impact on the confidentiality of information and the integrity of data and could reduce performance / cause interruptions to availability.

Additional details may be found in the full IBM security bulletin.


A remote authenticated attacker may be able to run operating system commands on the QRadar device.


Apply an Update

The vulnerability is fixed in the following version of QRadar SIEM:

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
IBM CorporationAffected02 May 201305 Jun 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.0 AV:N/AC:M/Au:S/C:P/I:P/A:P
Temporal 5.0 E:F/RL:OF/RC:C
Environmental 3.8 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Stephen Hosom for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2013-2970
  • Date Public: 03 Jun 2013
  • Date First Published: 05 Jun 2013
  • Date Last Updated: 05 Jun 2013
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.