page-brochureware.php
QRadar Software 101 QRadar support team’s software list to locate downloads, release notes, latest versions, and resolved issues.

Last update: 6 November 2024 – Added a reference to the security bulletin that outlines 294 CVEs resolved with the release of QRadar 7.5.0 UP10 Interim Fix 1.
Release date Name Version Resolved issues Security bulletins Notices Support status Release notes Fix Central Download
2024/10/29 QRadar SIEM 7.5.0 Update Pack 10 Interim Fix 1 (Build 20241028190757) This release resolves one reported issue.

DT395212: NullPointerException (NPE) when calling an AQL query that uses the GEO::LOOKUP function.
IBM QRadar SIEM contains multiple vulnerabilities

CVE-2020-36242 (9.1), CVE-2024-6345 (8.8), CVE-2024-2961 (8.8), CVE-2023-0286 (8.2), CVE-2024-36971 (7.8), CVE-2024-39331 (7.8), CVE-2023-4807 (7.8), CVE-2023-6597 (7.8), CVE-2024-33599 (7.6), CVE-2024-30203 (7.5), CVE-2024-45490 (7.5), CVE-2024-38286 (7.5), CVE-2024-30205 (7.5), CVE-2024-4032 (7.5), CVE-2024-34069 (7.5), CVE-2024-39689 (7.5), CVE-2024-0553 (7.5), CVE-2024-25062 (7.5), CVE-2023-4692 (7.5), CVE-2023-52530 (7.5), CVE-2023-42465 (7.5), CVE-2023-38325 (7.5), CVE-2023-2953 (7.5), CVE-2023-52425 (7.5), CVE-2021-43618 (7.5), CVE-2024-37370 (7.4), CVE-2024-21147 (7.4), CVE-2024-45492 (7.3), CVE-2024-45491 (7.3), CVE-2024-26669 (7.1), CVE-2024-26668 (7.1), CVE-2024-36960 (7.1), CVE-2024-2201 (7.1), CVE-2023-52707 (7.0), CVE-2021-47461 (7.0), CVE-2024-36904 (7.0), CVE-2024-26852 (7.0),
and 257 more medium and low severity CVEs.
Known issues
  • WinCollect: WinCollect 7.3.1-43 upgrade fails. The WinCollect RPM validation is out of date and causes the upgrade to fail. To resolve the issue, and for more information, see WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed.
  • X-Force: You can not access X-Force servers directly from a QRadar IPv6 box. To use X-Force in queries or custom rules, configure a proxy server. To enable a proxy, and for more information, see QRadar: X-Force Frequently Asked Questions.
  • Upgrading: In QRadar version 7.3.0 or earlier, appliances were built with smaller partition sizes that can cause issues when you upgrade to RHEL-8. Depending on the appliance type, you can save the SFS file in a different directory or rebuild the system at Update Package 8 or later, and then add it to the deployment. can experience an issue where events routing to storage unexpectedly; however, the EPS rate is not yet hitting the maximum capability of the appliance.
  • Apps: After you upgrade some apps remain in an “error” state on deployments with 30+ apps. Restart the apps by using the qappmanager: /opt/qradar/support/qappmanager. For more information, see About the qappmanager support utility.
  • Admin :Admin password does not set correctly on auto-install. In some instances of QRadar installations using the auto-install method, the Admin password is not being set properly. To resolve this issues, manually update the Admin password in the QRadar host CLI. For more information, see DT258627.
  • Autoupdates: After upgrading to QRadar 7.5.0 or later, older autoupdate versions may revert and fail to update RPMs properly. To check your autoupdate version, use the command: /opt/qradar/bin/UpdateConfs.pl -v. Review the issue and the resolution section for your auto update version in the following technical note, Common issues and troubleshooting for auto update version 9.11.
  • For the full list of known issues, see the release notes.
Latest 7.5.0 version SFS SFS
2024/10/14 QRadar SIEM 7.5.0 Update Pack 10 (Build 20241008193358)

Features

  • Light mode theme enabled as a user preference to switch from dark to light mode.
  • New parallel patching feature allows admins to see status of hosts as they upgrade and stage patch files in advance.
  • Federal Information Security Modernization Act (FISMA) support adds IPv6 integrations and features to QRadar across rules, searches, right-click filters, integrations, and more.
  • Performance enhancements for event and flow searches.
    • Improved event and flow search stability and performance for large deployments, high query concurrency, and complex datasets by managing memory more effectively.
    • Event and flow searches that interact with IPv6 addresses are up to 200 times faster.
  • WinCollect includes a new WinCollectHealthCheck.sh support script to update iptables after the UP10 upgrade.
  • Disabled 24 Java ciphers
This release resolves 25 reported issues.

  • DT394105: Performance degradation in 7.5.0 UP9 IF1 when you transition events between ecs-ec and ecs-ep components.
  • DT393397: Log Activity tab Add Filter button can display text highlights that are difficult to view in Dark Mode
  • DT390721: After you upgrade from QRadar 7.5.0 UP 7 to QRadar 7.5.0 UP 9, the Pulse App does not have the proper permissions to run.
  • DT389402: Geographic rule test fails location match when IP is present in Network Hierarchy.
  • DT387724: Logrotate can fail in QRadar 7.5.0 UP8 due to a configuration conflict.
  • DT389204: Event Collectors with encryption enabled that drop connections to the Event Processor might experience event loss.
  • DT389245: User Account Deleted event doesn’t contain information about the user who performed the action.
  • DT387114: The Notes in the Offense Summary CSV export are not in the correct order.
  • DT386337: Offline forwarding events fail with TCP over TLS when the event processor has no direct Internet access.
  • DT386288: Imported LDAP users are unable to receive emails due to the empty email field in users.conf.
  • DT381632: Blank page when adding an Ariel filter condition in a custom rule if the value ends with a backslash “\”.
  • DT382083: In Log Activity right click filters won’t display if the Source Address is IPv6.
  • DT378758: XML Expressions are unable to extract properties containing data after “&”.
  • DT365810: After changing the server time on the command line of a QRadar console, tomcat can get stuck on reading report templates and fail to fully start.
  • DT364304: QRadar HA secondary hosts can go into a failed state after deploying changes.
  • DT386044: Missing some fields for CRE Rule Modified SIM audit event.
  • DT269915: QRadar GUI can become unresponsive during a login attempt if the LDAP server is unresponsive.
  • DT270362: Custom AQL Queries are removed from Manage Search Results after a Full Deploy.
  • DT252121: Custom property deletion checker can incorrectly identify rule dependencies.
  • DT252137: Report summary displays the “Run this report when wizard is complete” option incorrectly on the report wizard.
  • DT208622: Deployments with multiple encrypted data nodes do not rebalance between each other as expected after an upgrade to QRadar 7.5.0 UP3.
  • DT121375: Changes made to the time series chat dashboard layout can fail to persist after logout.
  • DT145254: “AADSTS75011” error when you use Windows Hello by X509 without the auth context.
  • DT398172: QRadar: Correlation Rules and Building blocks owned by disabled users do not execute in UP9. No errors reported.
  • DT390627: Background deployment tasks triggered by LDAP user synchronization can block deploys initiated from the UI.
IBM QRadar SIEM contains multiple vulnerabilities

CVE-2018-1311 (9.8), CVE-2023-37536 (8.2), CVE-2022-46329 (8.2), CVE-2024-5197 (7.8), CVE-2021-42771 (7.8), CVE-2023-25577 (7.5), CVE-2023-2953 (7.5), CVE-2020-25219 (7.5), CVE-2023-30861 (7.5), CVE-2022-38725 (7.5), CVE-2024-37370 (7.4), CVE-2024-28786 (6.5), CVE-2024-37371 (6.5), CVE-2024-28752 (6.5), CVE-2022-48468 (6.2), CVE-2020-26137 (6.1), CVE-2023-32681 (6.1), CVE-2023-43804 (5.9), CVE-2023-46136 (5.7), CVE-2021-45429 (5.5), CVE-2024-22195 (5.4), CVE-2023-6349 (5.3), CVE-2020-26154 (5.3), CVE-2020-7212 (5.3), CVE-2023-31346 (4.4), CVE-2024-37891 (4.4), CVE-2024-23944 (4.3), CVE-2023-20592 (4.3), CVE-2023-45803 (4.2), CVE-2023-23934 (2.6)
Known issues
  • WinCollect: WinCollect 7.3.1-43 upgrade fails. The WinCollect RPM validation is out of date and causes the upgrade to fail. To resolve the issue, and for more information, see WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed.
  • X-Force: You can not access X-Force servers directly from a QRadar IPv6 box. To use X-Force in queries or custom rules, configure a proxy server. To enable a proxy, and for more information, see QRadar: X-Force Frequently Asked Questions.
  • Upgrading: In QRadar version 7.3.0 or earlier, appliances were built with smaller partition sizes that can cause issues when you upgrade to RHEL-8. Depending on the appliance type, you can save the SFS file in a different directory or rebuild the system at Update Package 8 or later, and then add it to the deployment. can experience an issue where events routing to storage unexpectedly; however, the EPS rate is not yet hitting the maximum capability of the appliance.
  • Upgrade: Upgrade patch pretest fails on dual stack. After you upgrade to 7.5.0 Update Package 9, the RHEL-8 upgrade pretest fails after the system reboot.
  • Apps: After you upgrade some apps remain in an “error” state on deployments with 30+ apps. Restart the apps by using the qappmanager: /opt/qradar/support/qappmanager. For more information, see About the qappmanager support utility.
  • Admin :Admin password does not set correctly on auto-install. In some instances of QRadar installations using the auto-install method, the Admin password is not being set properly. To resolve this issues, manually update the Admin password in the QRadar host CLI. For more information, see DT258627.
  • Autoupdates: After upgrading to QRadar 7.5.0 or later, older autoupdate versions may revert and fail to update RPMs properly. To check your autoupdate version, use the command: /opt/qradar/bin/UpdateConfs.pl -v. Review the issue and the resolution section for your auto update version in the following technical note, Common issues and troubleshooting for auto update version 9.11.
  • For the full list of known issues, see the release notes.
  • For the full list of known issues, see the release notes.
Latest 7.5.0 version SFS SFS
2024/09/16 QRadar SIEM 7.5.0 Update Pack 9 Interim Fix 3 (Build 20240913122216) DT393397: Background deployment tasks triggered by LDAP user synchronization can block deploys initiated from the UI IBM QRadar SIEM contains multiple vulnerabilities

CVE-2024-42472 (CVSS 10), CVE-2024-6345 (8.8), CVE-2024-1737 (7.5), CVE-2024-1975 (7.5), CVE-2024-26906 (5.5), CVE-2024-26982 (5.5), CVE-2024-38428 (5.4), CVE-2024-34064 (5.4), CVE-2024-3933 (5.3), CVE-2024-2398 (5.3), CVE-2024-25629 (4.4)

Known issues
  • WinCollect: WinCollect 7.3.1-43 upgrade fails. The WinCollect RPM validation is out of date and causes the upgrade to fail. To resolve the issue, and for more information, see WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed.
  • Upgrading: In QRadar version 7.3.0 or earlier, appliances were built with smaller partition sizes that can cause issues when you upgrade to RHEL-8. Depending on the appliance type, you can save the SFS file in a different directory or rebuild the system at Update Package 8 or later, and then add it to the deployment. can experience an issue where events routing to storage unexpectedly; however, the EPS rate is not yet hitting the maximum capability of the appliance.
  • Upgrade: Upgrade patch pretest fails on dual stack. After you upgrade to 7.5.0 Update Package 9, the RHEL-8 upgrade pretest fails after the system reboot.
  • Apps: After you upgrade some apps remain in an “error” state on deployments with 30+ apps. Restart the apps by using the qappmanager: /opt/qradar/support/qappmanager. For more information, see About the qappmanager support utility.
  • Admin :Admin password does not set correctly on auto-install. In some instances of QRadar installations using the auto-install method, the Admin password is not being set properly. To resolve this issues, manually update the Admin password in the QRadar host CLI. For more information, see DT258627.
  • Autoupdates: After upgrading to QRadar 7.5.0 or later, older autoupdate versions may revert and fail to update RPMs properly. To check your autoupdate version, use the command: /opt/qradar/bin/UpdateConfs.pl -v. Review the issue and the resolution section for your auto update version in the following technical note, Common issues and troubleshooting for auto update version 9.11.
  • For the full list of known issues, see the release notes.
See the latest 7.5.0 version SFS SFS
2024/08/19 QRadar SIEM 7.5.0 Update Pack 9 Interim Fix 2 (Build 20240812205941)
  • DT393397: Log activity page – Add filter text highlight issue.
  • DT365810: After changing the server time on the command line of a QRadar console, tomcat can get stuck on reading report templates and fail to fully start.
  • DT394105: Performance degradation in 7.5.0 UP9 IF1 when transitioning events between ecs-ec and ecs-ep components.
  • IBM QRadar SIEM contains multiple vulnerabilities

    CVE-2024-5564 (9.8), CVE-2024-26907 (7.8), CVE-2024-34750 (7.5), CVE-2024-26656 (7.5), CVE-2024-27397 (7.0), CVE-2021-47356 (6.7), CVE-2023-52626 (6.0), CVE-2023-5090 (6.0), CVE-2023-7008 (5.9), CVE-2024-26974 (5.8), CVE-2021-47456 (5.5), CVE-2021-47236 (5.5), CVE-2021-47310 (5.5), CVE-2021-47311 (5.5), CVE-2021-47353 (5.5), CVE-2021-47495 (5.5), CVE-2021-46972 (5.5), CVE-2021-47069 (5.5), CVE-2023-43788 (5.5), CVE-2023-43789 (5.5), CVE-2023-52667 (5.5), CVE-2023-52669 (5.5), CVE-2023-52675 (5.5), CVE-2023-52686 (5.5), CVE-2023-52700 (5.5), CVE-2023-52813 (5.5), CVE-2023-52835 (5.5), CVE-2023-52877 (5.5), CVE-2023-52878 (5.5), CVE-2023-52881 (5.5), CVE-2024-26584 (5.5), CVE-2024-26675 (5.5), CVE-2024-26735 (5.5), CVE-2024-26759 (5.5), CVE-2024-26804 (5.5), CVE-2024-26826 (5.5), CVE-2024-26906 (5.5), CVE-2024-26982 (5.5), CVE-2024-27410 (5.5), CVE-2024-35789 (5.5), CVE-2024-35835 (5.5), CVE-2024-35838 (5.5), CVE-2024-35845 (5.5), CVE-2024-35852 (5.5), CVE-2024-35853 (5.5), CVE-2024-35854 (5.5), CVE-2024-35855 (5.5), CVE-2024-35888 (5.5), CVE-2024-35890 (5.5), CVE-2024-35958 (5.5), CVE-2024-35959 (5.5), CVE-2024-35960 (5.5), CVE-2024-36004 (5.5), CVE-2024-36007 (5.5), CVE-2024-26583 (5.1), CVE-2024-26585 (5.1), CVE-2023-4692 (5.3), CVE-2023-4693 (5.4), CVE-2023-52464 (4.6), CVE-2024-26801 (4.4), CVE-2023-52615 (4.4), CVE-2023-52781 (4.4), CVE-2021-46909 (4.4), CVE-2020-26555 (4.2), CVE-2024-26859 (4.1), CVE-2024-22365 (4.0), CVE-2024-1048 (3.3), CVE-2023-52703 (3.3), CVE-2023-52560 (3.3), CVE-2021-47073 (2.3).

    Known issues
    • WinCollect: WinCollect 7.3.1-43 upgrade fails. The WinCollect RPM validation is out of date and causes the upgrade to fail. To resolve the issue, and for more information, see WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed.
    • Upgrading: In QRadar version 7.3.0 or earlier, appliances were built with smaller partition sizes that can cause issues when you upgrade to RHEL-8. Depending on the appliance type, you can save the SFS file in a different directory or rebuild the system at Update Package 8 or later, and then add it to the deployment. can experience an issue where events routing to storage unexpectedly; however, the EPS rate is not yet hitting the maximum capability of the appliance.
    • Upgrade: Upgrade patch pretest fails on dual stack. After you upgrade to 7.5.0 Update Package 9, the RHEL-8 upgrade pretest fails after the system reboot.
    • Apps: After you upgrade some apps remain in an “error” state on deployments with 30+ apps. Restart the apps by using the qappmanager: /opt/qradar/support/qappmanager. For more information, see About the qappmanager support utility.
    • Admin :Admin password does not set correctly on auto-install. In some instances of QRadar installations using the auto-install method, the Admin password is not being set properly. To resolve this issues, manually update the Admin password in the QRadar host CLI. For more information, see DT258627.
    • Autoupdates: After upgrading to QRadar 7.5.0 or later, older autoupdate versions may revert and fail to update RPMs properly. To check your autoupdate version, use the command: /opt/qradar/bin/UpdateConfs.pl -v. Review the issue and the resolution section for your auto update version in the following technical note, Common issues and troubleshooting for auto update version 9.11.
    • For the full list of known issues, see the release notes.
    See the latest 7.5.0 version SFS SFS
    2024/07/28 QRadar SIEM 7.5.0 Update Pack 9 Interim Fix 1 (Build 20240725005939)
  • DT386044: Missing some fields for CRE Rule Modified SIM audit event.
  • DT389402: Geographic rule test fails location match when IP is present in Network Hierarchy.
  • DT270362: Custom AQL Queries are removed from Manage Search Results after a Full Deploy.
  • DT386337: Offline forwarding events failing with TCP over TLS when eventprocessor has no direct Internet access.
  • DT389204: Event Collectors with encryption enabled that drop connections to the Event Processor might experience event loss.
  • IBM QRadar SIEM contains multiple vulnerabilities

    CVE-2024-32487 (9.8), CVE-2024-32002 (9.0), CVE-2024-26610 (8.4), CVE-2024-32004 (8.1), CVE-2024-25744 (7.8), CVE-2024-3652 (7.5), CVE-2023-2953 (7.5), CVE-2021-33198 (7.5), CVE-2022-2879 (7.5), CVE-2022-2880 (7.5), CVE-2022-41715 (7.5, CVE-2023-39321 (7.5), CVE-2023-39322 (7.5), CVE-2023-45287 (7.5), CVE-2024-24786 (7.5), CVE-2023-52425 (7.5), CVE-2024-24806 (7.3), CVE-2024-32465 (7.3), CVE-2022-48624 (7.0), CVE-2023-52439 (7.0),
    and 72 more medium and low severity CVEs.
    Known issues
    • WinCollect: The WinCollect RPM validation is out of date and causes the upgrade to fail for UP8 or UP9. For more information see, WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed”
    • Disk Space: In QRadar version 7.3.0 or earlier, appliances were built with smaller partition sizes that can cause issues when you upgrade to RHEL-8. Depending on the appliance type, you can save the SFS file in a different directory or rebuild the system at Update Package 8 or later, and then add it to the deployment.
    • WinCollect: If you upgrade to QRadar 7.5.0 Update Package 9 and have WinCollect 7.x agents deployed in managed mode, you must install the WinCollect 7.3.1-43 SFS file as outlined in the WinCollect 7.3.1-43 release notes.
    • Upgrade: Upgrade patch pretest fails on dual stack.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Apps: Duplicate app entries on Traefik when QRadar console is powered off and on again.
    • For the full list of known issues, see the release notes.
    See the latest 7.5.0 version SFS SFS
    2024/07/09 QRadar SIEM 7.5.0 Update Pack 9 (Build 20240719124908)

    Flash notice
    A small number of users reported much longer than expected upgrade times. A re-release of QRadar 7.5.0 UP9 is pending to resolve this issue. For more information, see the Flash Notice.

    Features

    • Dark theme enabled across QRadar
    • CIDR data type in reference sets
    • RegexMonitor adds a monitor-only mode for expensive properties without auto disabling
    • Performance enhancements for Data Nodes and Offline forwarding
    • Conole-only DR for Data Synchronization app
    This release resolved 69 reported issues.

    • DT256898: eps60s value is not set to 0 when the log source stops receiving events
    • DT256900: CEP cannot be toggled for force parsing If a custom rule’s name starts with a CEP name and it is used by another rule
    • DT257068: Users cannot configure a test parameter for a rule when using a Reference Table
    • DT258372: When deleting rules from API the username is truncated in audit log if the username include a period (.)
    • DT258746: The “Assigned to User” filter has been removed when editing “My Offense”
    • DT258826: An application error is observed when clicking a link in the “Top Category Types” dashboard widget
    • DT259594: Assign offense menu showing as blank when trying to assign offense without log source access
    • DT259793: Use case manager rules can be inconsistent with rules in the rule tab
    • DT259763: AQL Custom Function Table Replication Issue in Data Gateway
    • DT261799: False Positive flags do not reflect correctly in the rules
    • DT261802: Customer with local language set as Simplified Chinese would run into offence page freeze
    • DT261851: Modifying system rule leads CRE to throw NPE when reading dependant rules
    • DT269186: Users who log in to QRadar can receive an Error “Invalid license key” when the license is valid
    • DT270141: Group Based LDAP Authentication does not preserve tenant assignment in User Details interface
    • DT270299: Scheduled reports that contains more than three columns throws “Array index out of range” exception
    • DT277116: Apps are in a failed state after upgrading to QRadar 7.5.0 Update Package 7 IF06 on a FIPS enabled system
    • DT364307: Failed to add HA on console when iscsi configured on UP8 install – not live
    • DT364450: Failed to add HA on a QRadar 7.5.0 UP8 console when an NFS mount is configured
    • DT365145: HA synchronization status in 7.5.0 UP8 is not displayed in System and License Management
    • DT365203: UP8 patch installer “–leapp-only” option does not support HA secondaries
    • DT365204: UP8 patch installer option “–leapp-only” will not run successfully on fresh UP7 installations
    • DT365205: Patching a QIF host to 7.5.0 UP7 or UP8 may result in services failing to start
    • DT365206: UP8 patch installer is unable to run “–leapp-only” option on a detached Console HA host
    • DT365574: Events that bypass parsing will not have the correct collectorid
    • DT365799: Cannot send udp syslog to QRADAR_CONSOLE_IP from app container on Apphost
    • DT365964: UserDomainPermission_Test still impacts CRE performance after fix for DT212087
    • DT366125: A boot loop can occur while patching to 7.5.0 UP8 due to incorrect grub configuration
    • DT378245: Cliniq failure on MH after RHEL8 migration causes patch to fail – not live
    • DT378557: LDAP Authentication module can generate an ‘Application Error’ when saving changes in 7.5.0 UP7
    • DT378590: Natted deployments will fail to patch as Installer does not look at public IPs for checking if leapp-only was run
    • DT378682: When patching to 7.5.0 UP8, the RHEL8 Leapp migration script fails to remove the mptbase kernel module on VMware hosts
    • DT378761: Expired user sessions preventing new logins
    • DT378774: Change in QRADAR-17670 for CONFIGSERVICE_URL to fqdn causes replication to try public IP first – not live
    • DT378823: Service scaserver is unable to start after migrating to RHEL 8 due to incorrect lib file
    • DT378980: Patching to QRadar 7.5.0 UP8 can hang in environments using network address translation (NAT)
    • DT380809: QRadar consoles running high availability with NFS mounts configured can fail “–leapp-only” tests when patching to 7.5.0 UP8
    • DT380966: Upgrades to QRadar 7.5.0 UP8 can fail if /storetmp does not have enough available disk space
    • DT381206: Upgrades to UP8 IF01 might cause applications not to start due to podman-client-registry keystore corruption
    • DT381391: 3148 AIO Console could have a CRE performance bottle neck
    • DT382094: Custom actions scripts no longer work due to permission issues
    • DT382313: Upgrading to QRadar 7.5.0 UP8 will fail on virtual hosts using an e1000 NIC adapter
    • DT386246: A kernel defect is causing a significant search performance degradation issue in QRadar 7.5.0 UP8 IF02
    • DT386356: A deploy while HA is syncing will invalidate store and cause/restart a full sync – not live
    • DT386462: When upgrading QRadar to 7.5.0 UP8, if an HA secondary host fails to reboot during the RHEL8 migration, the patch installer on the primary host will hang indefinitely
    • DT386559: Missing langpacks in UP8 cause API errors – not live
    • DT386964: Services broken when Patched UP8 host failover to Fresh UP8 host due to UID changes in RHEL8 – not live
    • DT139510: Log sources can sometimes display a status of error or not available when they are working as expected
    • DT251817: Non-admin user cannot edit the group of log sources using the API when the security profile is set to all log source groups
    • DT251857: QRadar apps can randomly disappear from the QRadar user interface
    • DT160982: The “Not” operator used with the log source API does not properly filter results as expected
    • DT134169: 7.5.0 UP1 deployments with QNI appliances can fail to deploy if the connection to QNI is unavailable
    • DT145570: Modifying the rule “Multiple login failures for single username” might cause a NPE error when QRadar is reading the rule
    • DT252005: install-ssl-cert.sh unable to install certificate signed by intermediate certificate authority
    • DT196807: QRadar filter “Source Network” displays an empty list in locales other than english
    • DT197404: Destination IP/Source IP search parameter does not work with multiple IPs separated by comma in the Offenses tab
    • DT252050: Apps can take longer than the default 90 seconds to start when 20 or more apps are installed
    • DT253292: Timestamps on the Manage Vulnerabilities -> By Vulnerability Instances screen are incorrect – not live
    • DT253294: Timestamps in a scan results (excel) report are displayed in the GMT timezone
    • DT215947: Log sources status column might not update as expected, leading to stale or outdates status information
    • DT253091: QRadar Risk Manager: Unable to create a topology model
    • DT252110: Offense tab columns do not sort as expected when search is set to default
    • DT244446: Custom rules: Match count rules do not trigger as expectedly when used with coalescing log sources
    • DT252111: Offenses created from flows rule does not show the first event in search result count
    • DT252084: QRadar non-administrator users cannot save changed to log source groups in the Log Source Management (LSM) app
    • DT252141: Reports fail to generate when files other than images exist in /store/reporting/reports/logos
    • DT252113: Admin tab can display an application error when assistant app cannot determine
    • DT252086: Quick filter flow interface values can be duplicated for admins in the user interface when domains are configured
    • DT252142: Data obfuscation can experience performance issues due to empty or null string checking
    • DT252099: Bytes sent sorting for numeric custom property is filtered in the user interface as alphabetic
    PENDING Known issues
    • Pulse app: Users with the Pulse app 2.2.14 or HA pairs can experience a permission error that prevents the application from running as expected after upgrading to 7.5.0 UP9. Users on Pulse 2.2.13 do not experience this issue. If possible, upgrade the Pulse app after you upgrade to UP9. Known issue: DT390721.
    • Upgrade: You must ensure that your deployment does not include hosts with LUKS encrypted partitions to successfully upgrade your system. For more information see, DT390721.
    • WinCollect: The WinCollect RPM validation is out of date and causes the upgrade to fail for UP8 or UP9. For more information see, WinCollect 7.3.1-43 upgrade fails due to “[CRITICAL] Transaction failed”
    • Disk space: Leapp pretests fail to ensure if the /storetmp directory has sufficient disk space to store the upgrade cache directory. You must ensure that all appliances have at minimum 10GB of space available in the /storetmp directory before you upgrade to 7.5.0 Update Package 9.
    • Network: Bonded NICs renamed during RHEL7 to RHEL8 migration cause network outage on host, seeDT391410.
    • WinCollect: If you upgrade to QRadar 7.5.0 Update Package 9 and have WinCollect 7.x agents deployed in managed mode, you must install the WinCollect 7.3.1-43 SFS file as outlined in the WinCollect 7.3.1-43 release notes.
    • Upgrade: Upgrade patch pretest fails on dual stack.
    • HA: High availability upgrades to QRadar 7.5.0 Update Package 9 require a full DRBD re-sync after the upgrade completes.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Network: The e1000 network driver is not supported in Red Hat Enterprise Linux 8. For more information, see DT382313.
    • For the full list of known issues, see the release notes.
    Latest 7.5.0 version SFS
    ISO
    SFS
    ISO
    2024/06/03 QRadar SIEM 7.5.0 Update Pack 8 Interim Fix 3 (Build 20240527155707)
  • DT365799: Cannot send udp syslog to QRADAR_CONSOLE_IP from app container on Apphost
  • DT386246: A kernel defect is causing a significant search performance degradation issue in QRadar 7.5.0 UP8 IF02


  • The following fixes are were initially released in 7.5.0 UP8 IF2 and are included in 7.5.0 UP8 IF3:

  • DT270141: LDAP authentication does not allow the mapping of tenants.
  • DT252142: Data obfuscation can experience performance issues due to empty or null string checking
  • DT365145: HA synchronization status in 7.5.0 UP8 is not displayed in System and License Management
  • DT215947: Log sources status column might not update as expected leading to stale or outdated status information
  • PENDING

    Note: As interim fixes are cumulative, users receive mitigations for CVEs from 7.5.0 UP8 IF1 and IF2 when you install IF3.
    Known issues
    • Upgrade: Upgrade patch pretest fails on dual stack (IPv4 and IPv6) appliances. After you upgrade to 7.5.0 Update Package 8, the RHEL-8 upgrade pretest fails after the system reboot.
    • Applications: After you upgrade some apps remain in an “error” state on deployments with 30+ apps. Restart the apps by using the qappmanager: /opt/qradar/support/qappmanager utility.
    • Applications: After you install QRadar 7.5.0, your applications might go down temporarily while they are being upgraded to the latest base image.
    • Upgrade: Admin password does not set correctly on auto-install. To resolve this issues, manually update the Admin password in the QRadar host CLI. For more information, see DT258627.>/li>
    • WinCollect: If you upgrade to QRadar 7.5.0 Update Package 8 and have WinCollect 7.x agents deployed in managed mode, you must install the WinCollect 7.3.1-43 SFS file as outlined in the WinCollect 7.3.1 P3 release notes.
    • For the full list of known issues, see the release notes.
    Latest 7.5.0 version SFS SFS
    2024/05/03 QRadar SIEM 7.5.0 Update Pack 8 Interim Fix 2 (Build 20240429142841 Removed) Software removed, see 7.5.0 Update Package 8 Interim Fix 3. IBM QRadar SIEM contains multiple vulnerabilities

    CVE-2023-45871 (9.8), CVE-2023-5178 (8.8), CVE-2023-28772 (8.4), CVE-2023-1989 (8.4), CVE-2019-19203 (8.4), CVE-2019-19204 (8.4), CVE-2022-28388 (8.4), CVE-2023-33952 (8.2), CVE-2023-2163 (8.2), CVE-2021-43818 (8.2), CVE-2024-1488 (8.0), CVE-2024-1086 (7.8), CVE-2023-46813 (7.8), CVE-2023-42753 (7.8), CVE-2023-40283 (7.8), CVE-2023-30456 (7.8), CVE-2023-35823 (7.8), CVE-2023-35824 (7.8), CVE-2022-26691 (7.8), CVE-2023-6931 (7.8), CVE-2023-6932 (7.8), CVE-2023-6817 (7.8), CVE-2023-6546 (7.8), CVE-2023-5717 (7.8), CVE-2023-5633 (7.8), CVE-2023-4921 (7.8), CVE-2023-4623 (7.8), CVE-2023-4622 (7.8), CVE-2023-4206 (7.8), CVE-2023-4207 (7.8), CVE-2023-4208 (7.8), CVE-2023-4128 (7.8), CVE-2023-3812 (7.8), CVE-2023-3609 (7.8), CVE-2023-3611 (7.8), CVE-2023-2176 (7.8), CVE-2022-4744 (7.8), CVE-2022-38096 (7.8), CVE-2023-34241 (7.7), CVE-2023-52425 (7.5), CVE-2023-50387 (7.5), CVE-2023-50868 (7.5), CVE-2021-43618 (7.5), CVE-2024-0565 (7.1), CVE-2023-6606 (7.1), CVE-2023-6610 (7.1), CVE-2023-3268 (7.1), CVE-2023-1838 (7.1), CVE-2007-4559 (7.1), CVE-2024-0646 (7.0), CVE-2023-1252 (7.0), CVE-2023-0590 (7.0), CVE-2022-48624 (7.0), CVE-2022-45884 (7.0), and 73 other lower severity CVEs
    Software removed, see 7.5.0 Update Package 8 Interim Fix 3. N/A N/A N/A
    2024/04/09 QRadar SIEM 7.5.0 Update Pack 8 Interim Fix 1 (Build 20240405183541) DT378557: LDAP authentication module can generate an ‘Application Error’ when saving changes in 7.5.0 UP7. IBM QRadar SIEM contains multiple vulnerabilities

    CVE-2023-51385 (9.8), CVE-2023-4091 (8.8), CVE-2019-19203 (8.4), CVE-2019-19204 (8.4), CVE-2022-46329 (8.2), CVE-2023-34966 (7.5), CVE-2023-2828 (7.5), CVE-2023-3341 (7.5), CVE-2022-3094 (7.5), CVE-2022-45061 (7.5), CVE-2023-42465 (7.5), CVE-2020-28241 (7.3), CVE-2023-26604 (7.1), CVE-2023-5388 (6.5), CVE-2023-6135 (6.5), CVE-2023-46218 (6.5), CVE-2021-35938 (6.5), CVE-2021-35939 (6.5), CVE-2023-42669 (6.5), CVE-2021-35937 (6.3), CVE-2022-48560 (6.2), CVE-2020-7656 (6.1), CVE-2015-9251 (6.1), CVE-2012-6708 (6.1), CVE-2024-0553 (5.9), CVE-2023-43804 (5.9), CVE-2022-2127 (5.9), CVE-2023-48795 (5.9), CVE-2023-1786 (5.5), CVE-2022-48564 (5.5), CVE-2021-41043 (5.5), CVE-2023-39615 (5.3), CVE-2023-34968 (5.3), CVE-2023-34967 (5.3), CVE-2023-28486 (5.3), CVE-2023-28487 (5.3), CVE-2023-27043 (5.3), CVE-2023-22081 (5.3), CVE-2023-22067 (5.3), CVE-2019-19012 (5.1), CVE-2023-20569 (4.7), CVE-2011-4969 (4.3), CVE-2023-45803 (4.2), CVE-2023-5676 (4.1), CVE-2023-28322 (3.7), CVE-2023-38546 (3.7), CVE-2019-13224 (3.3), CVE-2019-16163 (3.3)
    Known issues
    • Encryption: Upgrading to RHEL-8 on systems with LUKS encrypted partitions is not supported. For more information see, Hosts with LUKS encryption cannot be upgraded to 7.5.0 Update Pack 8
    • Disk space: Leapp pretests fail to ensure if the /storetmp directory has sufficient disk space to store the upgrade cache directory. You must ensure that all appliances have at minimum 10GB of space available in the /storetmp directory before you upgrade to 7.5.0 Update Package 8. For more information, see the QRadar 7.5.0 Update Package 8 release notes.
    • HA – Required: Administrators with High Availability (HA) appliances in their deployment must complete a post-installation step that is new in QRadar 7.5.0 Update Package 8. After the update completes, you must complete the procedure outlined in DT365145.
    • WinCollect: QRadar 7.5.0 Update Package 8 users with WinCollect 7 must update to the latest version. If you upgrade to QRadar 7.5.0 Update Package 8 and have WinCollect 7.x agents deployed in managed mode, you must install the WinCollect 7.3.1-43 SFS file as outlined in the WinCollect 7.3.1 P3 release notes.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    • For the full list of known issues, see the release notes.
    Latest 7.5.0 version SFS SFS
    2024/03/25 QRadar SIEM 7.5.0 Update Pack 8 (Build 20240302192142)

    RHEL 8.8 OS update

    Important: Users with High Availability (HA) must run the post-upgrade tool before you attempt any failover testing as described in DT365145.
    This release resolved 31 issues.

    • DT257036: Unbound-anchor.service is reaching out publicly to DNS root servers
    • DT258217: False-positive offenses are produced after the restart of ecs-ep process
    • DT258235: Null Pointer Exception in Regex Monitor causes perfromance issues in event parsing
    • DT258345: Re-adding a managed host can appear to be hung at the final step in the ‘Host is Being Added to Deployment’ window
    • DT258961: False Positive offenses produced where rules use reference set not conditions
    • DT259134: Unknown offense created on destination QRadar when forwarding normalized data from Source QRadar
    • DT259571: Dropped events in log source protocol queue after upgrade to QRadar 7.5.0 Up 7
    • DT259793: CRE Rule seems to be affecting the parsing of ADE AQL Properties
    • DT084375: The managed search results page can be slow to load in QRadar environments with a large amount of Ariel query handles
    • DT133052: QRadar – High availability crossover enable fails with ssh StrictHostKeyChecking
    • DT256838: 7.5.0 UP7 IF03 Java change causes Amazon Web Service Log Source Type to stop working
    • DT251945: Retain option available on freshly installed High Availability (HA) systems from factory reinstall
    • DT251920: Time server set during initial installation reset after running qchange
    • DT252014: HA Setup fails with “failed to change group ownership error”
    • DT252073: QRadar tunnel-monitor service incorrectly attempts to create connections from HA standby appliances
    • DT252127: Common rule test ‘Event or flow processed by custom rules engine’ can display a Number Format Exception
    • DT252102: When AQL properties created before 7.4.3 exist in the forwarding profile, offline forwarding is slow
    • DT252089: Invalid byte sequence for encoding “UTF8” while accessing reference data API or UBA import user
    • DT252090: Historical correlation offense summary page can display a ‘file access error’ when viewing grouped events
    • DT245546: STIG hardening on QRadar 7.5.0 Update Package 7 might not set a boot password, forcing a reinstall
    • DT241221: HA Secondary disk space issues can occur when files for older versions of ECS are not removed
    • DT244451: Hostcontext can exceed the default 256MB allocation, leading to out of memory issues on hosts
    • DT244446: Custom rules: Match count rules do not trigger as expectedly when used with coalescing log sources
    • DT244729: Log File protocol configured to connect with SFTP can stop collecting events unexpectedly in 7.5.0 UP7
    • DT252131: Rule Wizard displays a blank pop up for the ‘Name of the flow source is one of these sources’ test
    • DT252139: Asset details window does not display the latest email address when changed
    • DT252100: Reference Table value incorrectly displayed in the rule responses of the Rule Wizard when edited
    • DT259368: QRadar Applications failing to install/update after upgrading to QRadar 7.5.0 UP6
    • DT224076: Rule Wizard displays ‘The response count must be 0 or greater’ when enabling response limiters with non-english UI locales
    • DT238257: Nightly backups fail if applications are in error status
    • DT251980: Rule “Source/Destination asset weight is low” can trigger when weight is higher than the defined parameter
    IBM QRadar SIEM includes components with known vulnerabilities

    CVE-2020-36242 (9.1), CVE-2023-4091 (8.8) CVE-2023-0286 (8.2), CVE-2021-43818 (8.2), CVE-2022-40304 (7.8), CVE-2022-40303 (7.8), CVE-2023-42753 (7.8), CVE-2022-25647 (7.7), CVE-2022-36760 (7.5), CVE-2020-28493 (7.5), CVE-2020-10735 (7.5), CVE-2023-0215 (7.5), CVE-2023-34966 (7.5), CVE-2018-1000632 (7.3), CVE-2021-28957 (7.2), CVE-2019-1551 (6.8), CVE-2023-3961 (6.8), CVE-2023-42669 (6.5), CVE-2020-27783 (6.1), CVE-2023-4813 (5.9), CVE-2022-4304 (5.9), CVE-2022-2127 (5.9), CVE-2023-6129 (5.9), CVE-2023-4806 (5.9), CVE-2020-25659 (5.9), CVE-2023-42503 (5.5), CVE-2019-1547 (5.5), CVE-2023-7104 (5.5), CVE-2022-48565 (5.5), CVE-2022-48564 (5.5), CVE-2020-10683 (5.3), CVE-2023-27043 (5.3), CVE-2023-36632 (5.3), CVE-2023-34967 (5.3), CVE-2023-34968 (5.3), CVE-2023-23931 (4.8), CVE-2018-17196 (4.3), CVE-2023-3446 (3.7), CVE-2023-5678 (3.7), CVE-2020-1968 (3.7), CVE-2023-3817 (3.7), CVE-2019-1563 (3.7)
    Known issues
    • Encryption: Upgrading to RHEL-8 on systems with LUKS encrypted partitions is not supported. For more information see, Hosts with LUKS encryption cannot be upgraded to 7.5.0 Update Pack 8
    • Disk space: Leapp pretests fail to ensure if the /storetmp directory has sufficient disk space to store the upgrade cache directory. You must ensure that all appliances have at minimum 10GB of space available in the /storetmp directory before you upgrade to 7.5.0 Update Package 8. For more information, see the QRadar 7.5.0 Update Package 8 release notes.
    • HA – Required: Administrators with High Availability (HA) appliances in their deployment must complete a post-installation step that is new in QRadar 7.5.0 Update Package 8. After the update completes, you must complete the procedure outlined in DT365145.
    • WinCollect: QRadar 7.5.0 Update Package 8 users with WinCollect 7 must update to the latest version. If you upgrade to QRadar 7.5.0 Update Package 8 and have WinCollect 7.x agents deployed in managed mode, you must install the WinCollect 7.3.1-43 SFS file as outlined in the WinCollect 7.3.1 P3 release notes.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    • For the full list of known issues, see the release notes.
    Fixes delivered on latest 7.5.0 version SFS
    ISO
    SFS
    ISO
    2024/03/04 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 6 (Build 20240225123426)
    • DT258961: False Positive offenses produced where rules use reference set not conditions.
    • DT259571: Dropped events in log source protocol queue after upgrade to QRadar 7.5.0 UP 7.
    • DT261291: Qualys and Nessus scans won’t run after installing 7.5.0 UP 7 IF03.
    IBM QRadar SIEM includes components with known vulnerabilities

    CVE-2022-46337 (9.1), IBM X-Force PSIRT-ADV0103951 (8.1), CVE-2023-33850 (7.5), CVE-2024-20918 (7.4), CVE-2024-20952 (7.4), CVE-2022-34169 (7.3), CVE-2024-20921 (5.9), CVE-2024-20926 (5.9), CVE-2024-20945 (4.7), CVE-2024-20919 (4.7)
    Known issues
    • New: Managed WinCollect 7 agents cannot receive updates from encrypted QRadar Managed Hosts with QRadar 7.5.0 Update Package 7 Interim Fix 05 or later. For more information, see DT269649
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attempting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    • Secure boot: Hosts with EFI firmware and Secure Boot enabled may become unresponsive. To avoid this problem, you must import the IBM public key contained on the SFS into the system keyring before patching. For more information, see Updating a Secure Boot enabled system
    Fixes delivered on latest 7.5.0 version SFS SFS
    2024/02/05 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 5 (Build 20240129133209)
    • DT258217: False-positive offenses are produced after the restart of ecs-ep process.
    • DT258345: Re-adding host does not close dialog and does not allow remapping components.
    • DT259793: CRE Rule seems to be affecting the parsing of ADE AQL Properties.
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2022-43552, CVE-2023-44981 (CVSS: 8.1), CVE-2023-5676, CVE-2023-43642, CVE-2023-32360, CVE-2022-40982, CVE-2023-3611, CVE-2023-3776, CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-20593, CVE-2023-20569, CVE-2023-37920)
    Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attempting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    • Secure boot: Hosts with EFI firmware and Secure Boot enabled may become unresponsive. To avoid this problem, you must import the IBM public key contained on the SFS into the system keyring before patching. For more information, see Updating a Secure Boot enabled system
    Fixes delivered on latest 7.5.0 version SFS SFS
    2024/01/08 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 4 (Build 20231220123907)
    • DT252100 | IJ49409: Reference table value incorrectly displayed in the rule responses of the rule wizard when edited
    • DT256838: 7.5.0 UP7 IF03 Java change causes Amazon Web Service Log Source Type to stop working
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2023-50164 (CVSS: 9.8), CVE-2023-34058, CVE-2023-34059, CVE-2022-40152, CVE-2023-40217, CVE-2023-50950, IBM X-Force 220573)
    Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attempting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    • Secure boot: Hosts with EFI firmware and Secure Boot enabled may become unresponsive. To avoid this problem, you must import the IBM public key contained on the SFS into the system keyring before patching. For more information, see Updating a Secure Boot enabled system
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/12/04 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 3 (Build 20231125162043)
    • IJ48955: Log file protocol configured to connect with sftp can stop collecting events unexpectedly in 7.5.0 UP7.
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2023-26049, CVE-2023-40167, CVE-2023-36479, CVE-2023-32233, CVE-2023-35001, CVE-2023-44487, CVE-2023-42795, CVE-2023-45648, CVE-2023-46604 (CVSS: 9.4), CVE-2023-34040, CVE-2023-22045, CVE-2023-22049, CVE-2023-41835, CVE-2023-36478, CVE-2023-47146, CVE-2023-46589, CVE-2023-40787, CVE-2023-41080, X-Force ID: 261776)
    Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attempting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/11/06 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 2 (Build 20231102164146)
    • IJ48883: Hostcontext can exceed the default 256MB allocation, leading to out of memory issues on hosts.
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2020-22218, CVE-2023-20593,CVE-2023-35788, CVE-2022-44730, CVE-2022-44729, CVE-2023-20900, CVE-2023-3341, CVE-2023-3899, CVE-2023-43057)
    Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/10/10 QRadar SIEM 7.5.0 Update Pack 7 Interim Fix 1 (Build 20231003192551)
    • IJ46232: QRadar tunnel-monitor service incorrectly attempts to create connections from HA standby appliances.
    • IJ48710: QRadar appliances configured with STIG hardening who upgrade to UP7 must remove a file before you reboot and run the harden utility is resolved in 7.5.0 UP7 IF1.
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2019-17571, CVE-2022-23305, CVE-2022-23307, CVE-2022,23302, CVE-2021-4104, CVE-2020-9488, CVE-2020-9493, CVE-2023-24329, CVE-2023-43041)
    Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/09/25 QRadar SIEM 7.5.0 Update Pack 7 (Build 20230822112654) Note: This release resolved 48 issues. Users with unencrypted managed hosts OR STIG enabled appliances must read the known issues section.

    • IJ16414: Reports generate with incorrect chart data and column name with some advanced searches (AQL)
    • IJ24182: The tzdata DST rules for America/Santiago are out of date and have the incorrect date for switchover to DST.
    • IJ29030: Log sources deleted from within log source groups can still appear in the QRadar user interface.
    • IJ30347: “There was a problem saving the log source type configuration” after clicking save on the DSM editor page.
    • IJ30863: QRadar content pack can cause offenses to be triggered off of source IP instead of custom event property configured in rule.
    • IJ35845: Reports can be sent to user addresses in “multiple reports” option when “single report option” is selected.
    • IJ35951: Benign error in patches.log file can be observed during or after a QRadar patch or upgrade.
    • IJ36270: QRadar patching can fail due to disk space requirements when adequate space is available.
    • IJ39393: Routing rule displays a blank page when the install is a software appliance on 7.5.0 UP1.
    • IJ39620: Performance issues can occur when QRadar attempts a reload of sensor devices when log sources exceed 2 million.
    • IJ39771: Scheduled weekly or monthly reports display “no data for chart” after upgrading to 7.5.0 UP5.
    • IJ41206: App install fails during docker build with “an exception occurred while waiting for task to complete” error.
    • IJ43426: Sorting by column in the offenses tab removes search filters.
    • IJ43432: Tomcat might go out of memory during deployments when the user has millions of log sources.
    • IJ43805: System notification displays incorrect message when the tomcat certificate is due to expire.
    • IJ43957: Poor scalability in referencedata cache resulting in degrading search performance when using filters and tests.
    • IJ44269: Users unable to export license information from QRadar Console GUI.
    • IJ44724: QRadar asset creation events can display a generic identity:0 in the created by field for asset profiler events.
    • IJ44868: Upgrade can complete and display an error about a custompropertiesscript trying to insert or update a table.
    • IJ45396: Offense search can add unexpected filters to the current search parameters after closing an offense.
    • IJ45679: Services can experience out of memory issues due to large certificate revocation lists (CLRS).
    • IJ45735: Reports tab can display as blank if the template file for a removed user is missing.
    • IJ45829: Rule wizard cannot transition to the next page properly when rule response updates a reference table.
    • IJ45914: QRadar system anomaly detection engine (ADE) rules can generate extra rules when modified multiple times.
    • IJ45926: Anomaly rule enabling “test the [this accumulated property] value of each log source separately” displays application error.
    • IJ46116: Offense summary for match count rules does not return all results for the event/flow count field.
    • IJ46159: Rule tests with multiple reference set values can display “an error has occurred saving your rule”.
    • IJ46184: QFlow collectors and processors in different domains can experience connection issues.
    • IJ46231: Upgrading a detached app host appliance fails as the upgrade is waiting on docker and conman services.
    • IJ46298: Standby HA appliances can run keystore certificate validator on inactive hosts causing benign log messages.
    • IJ46916: Log activity tab can display event ID and category as N/A when the payloads are parsed and mapped correctly.
    • IJ46986: Users cannot open the rules wizard from the offenses tab on QRadar 7.5.0 Update Package 6.
    • IJ47011: Applications might fail to restart after apphost upgraded from UP5 to UP6.
    • IJ47032: Unknown or stored events can route incorrectly to the sim generic log source in QRadar 750 UP4 and later.
    • IJ47046: Reference data import fails with numberformatexception due to invalid number converter.
    • IJ47049: Risks tab might not load after an upgrade to QRadar 7.5.0 UP6.
    • IJ47129: Events can stop processing when pipelinediskmonitor detects the disk spillover threshold is crossed.
    • IJ47194: Reports that use the “include date in email subject only” does not behave as expected.
    • IJ47404: Ariel processes might not allocate enough memory for memory-heavy operations, causing slower searches.
    • IJ47468: Advanced searches (AQL) that use the “in” operator do not use indexes as expected.
    • IJ47587: Rule wizard for ADE rules does not preserve the state of the “test separately” check box.
    • IJ47623: Completing a pretest with the installer -T command can cause Network Insights forensics issues.
    • IJ47894: Scheduled daily reports do not generate on a weekend as expected.
    • IJ45775: QRadar cannot log in while the LDAP server is unresponsive, which can lead to tomcat errors.
    • IJ46702: PCAP data not stored in ariel or displayed after an upgrade to QRadar 7.5.0 update package 2 or later.
    • IJ46928: QRadar applications can get stuck in an error state after an upgrade to 7.5.0 update package 6.
    • IJ48422: QFlow services can experience service start or restart issues due to libpcap update for older avx2 processors.
    • IJ48423: User management window does not display as expected from the Admin tab when the language preference is non-English
    IBM QRadar SIEM includes components with known vulnerabilities

    (CVE-2023-34981, CVE-2022-25147, CVE-2020-13956, CVE-2023-21830, CVE-2023-21843, CVE-2022-3564, CVE-2023-32067, CVE-2023-33201, CVE-2023-28709, CVE-2023-30441, CVE-2023-40367, CVE-2016-1000027, CVE-2023-34455, CVE-2023-34454, CVE-2023-34453, CVE-2022-40609, CVE-2022-48339, CVE-2023-35116, CVE-2023-20867, CVE-2022-21426, CVE-2023-26048, CVE-2023-26049, CVE-2023-30994, CVE-2023-38408, CVE-2023-2828, CVE-2023-34149, CVE-2023-25652, CVE-2023-29007, CVE-2023-32697, CVE-2023-21930, CVE-2023-21967, CVE-2023-21954, CVE-2023-21939, CVE-2023-21968, CVE-2023-21937, CVE-2023-21938, CVE-2023-2597, CVE-2023-2976, CVE-2023-34396)
    Known issues
    • IMPORTANT: Administrators need to confirm their managed hosts are encrypted before you upgrade to QRadar 7.5.0 Update Package 7 to prevent a known issue with deploys documented as IJ49176/DT247083.
    • IMPORTANT: QRadar appliances configured with STIG hardening who upgrade to UP7 must remove a file before you reboot and run the harden utility.
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS
    ISO
    SFS
    ISO
    2023/08/24 QRadar SIEM 7.5.0 Update Pack 6 Interim Fix 4 (Build 20230823122721) Note: Several APARs are included in 7.5.0 UP6 IF4, but are waiting on another release before the APARs can be transitioned to CLOSED. Your Console must be installed with QRadar 7.5.0 UP6, Interim Fix 1, or Interim Fix 2 to apply this update. Interim Fix 3 was not released to users, so this software release list jumps from IF2 to IF4.

    0 Known issues
    • Upgrade: Upgrades to QRadar 7.5.0 UP6 might take an extended amount of time to complete due to glusterfs file cleanup. You must allow the upgrade to continue uninterrupted.
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps might go down during the base image update.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/07/13 QRadar SIEM 7.5.0 Update Pack 6 Interim Fix 2 (Build 20230630203543) Note: Several APARs are included in 7.5.0 UP6 IF2, but are waiting on another release before the APARs can be transitioned to CLOSED. Your Console must be installed with QRadar 7.5.0 UP6 or UP6 IF1 to apply this interim fix.

    0 Known issues
    • Upgrade: Upgrades to QRadar 7.5.0 UP5 might take an extended amount of time to complete due to glusterfs file cleanup. You must allow the upgrade to continue uninterrupted.
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps might go down during the base image update.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/06/22 QRadar SIEM 7.5.0 Update Pack 6 Interim Fix 1 (Build 20230612173609) Note: This release resolves one issue with several security bulletins pending publication related to this release.

    • IJ47049: Risks tab might not load after an upgrade to QRadar 7.5.0 Update Package 6.
    0 Known issues
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps might go down during the base image update.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
      Other notices
    • Precheck added for postgresql 11 migration.
    • Fixing browser certificate warnings. In QRadar 7.5.0 Update Package 5, vault has been replaced by QRadar Certificate Authority (CA) and intermediate CA.
    • Upgrading SOAR app might be required.
    • You can now add QNI hosts to the Data Synchronization app.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/06/19 QRadar SIEM 7.5.0 Update Pack 6 (Build 20230519190832) Note: This release resolved 41 APARs. One item IJ39771 is waiting on another release before the APAR can be transitioned to CLOSED.

    • IJ29153: The /var/log partition can fill up due to the tomcat2.log file not being rotated.
    • IJ30091: Editing a managed host in a NAT group generates message “IP for host already exists in deployment”.
    • IJ30703: Removing a failed QRadar app upgrade by using extensions management also removes the existing running installation.
    • IJ31092: QRadar patching can fail due to a free space check that fails.
    • IJ33166: Aggregated searches are showing the wrong flag for some IP addresses.
    • IJ34647: Upgrading to QRadar 7.4.3 results in a list of deprecated custom event properties being displayed.
    • IJ35016: Overridden identity properties can fail to display as expected in the log activity tab.
    • IJ35774: Out of memory for decapper on QRadar Network Insights host can occur in advanced inspection level.
    • IJ39771: Scheduled reports can run on raw data causing them to fail or take longer than expected to complete.
    • IJ39814: Postgresql uninstalled after hostservices restarts on standby high availability managed host.
    • IJ40522: Anomaly issues in 7.5.0 UP2 prevent rules wizard from launching and effects offense creation.
    • IJ41830: Truncated NVA configuration file can cause failures on deployed managed hosts.
    • IJ42465: Applications can time out or fail to load due to conman-mks secret encryption performance.
    • IJ43771: Offense emails might not send when custom properties in the agent-config.xml template use curly quotations.
    • IJ43779: High availability setup can fail when primary and secondary IP addresses are too similar.
    • IJ44076: After upgrading to 7.5.0, known_hosts keys can be removed unexpectedly causing SSH errors.
    • IJ44383: A user custom event property (CEP) can incorrectly display the owner as admin in the user interface.
    • IJ44384: Copying a custom property can incorrectly assign the original CEP owner (admin) to a new user.
    • IJ44435: QRoC SAASADMIN role unable to list all users associated with an asset.
    • IJ44580: QRadar apps fail to start or stop after editing an app host setting to disable encryption.
    • IJ44597: Application-related issues might occur due to docker keystore error.
    • IJ44637: Domain permission checks can impact performance in the CRE and might send events to store.
    • IJ44654: “Exception reading CRE rules” error in rules used in cause and effect tests due to NullPointerException.
    • IJ44655: Last 30 days in saved search AQL query is searching for information for 5 years.
    • IJ44661: QRadar namevaluepairparser can experience errors when the last value contains pair separator.
    • IJ44726: “Top category type” dashboard can cause performance issues, leading to Tomcat (UI) instability.
    • IJ45127: Radius authentication fails in 7.5.0 UP4 due to invalid attributes in configuration file.
    • IJ45153: QNI suspect content descriptions for cert flows can be “certificate invalid” if message header timestamp is invalid.
    • IJ45353: Console configuration changes in deployment actions can cause global rule issues.
    • IJ45383: Rule wizard interface refreshes unexpectedly when there is a valid QVM license but no assigned QVM component.
    • IJ45452: Daily reports run out of schedule and can ignore the wizards settings.
    • IJ45552: Inconsistent JSON custom property parsing for optimized payloads with double backslash characters.
    • IJ45660: Rule changes from the console might be rejected by the managed host when IMQ message queue is full.
    • IJ45736: QRadar unparsed logs incorrectly go to the consoles SIM generic log source.
    • IJ45778: Optimized JSON custom event properties with backslashes parse as N/A in the user interface.
    • IJ45878: QRadar upgrades to 7.5.0 Update Package 5 can take an extended amount of time to complete.
    • IJ45913: Custom event property definition window displays empty “field type” when creating new CEP.
    • IJ46246: File names from SMTP email traffic attachments are not reported in QNI 7.5.0.
    • IJ46357: Geographic data rules cause search and event pipeline issues when the location cache exceeds the spillover threshold.
    • IJ46418: Tuning changes can slow ecs-ec components resulting in delays and events routing to storage.
    • IJ46619: Enabled geographic data indexes can cause performance issues in QRadar 7.5.0 UP5.
    Known issues
    • Upgrade: QRadar Risk Manager Risks tab might not load after an upgrade to QRadar 7.5.0 Update Package 6.
    • Upgrade: Upgrades to QRadar 7.5.0 UP6 might take longer to complete due to glusterfs file cleanup
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps : Apps might go down during the base image update.
    • Data Nodes: When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Upgrade: If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/05/10 QRadar SIEM 7.5.0 Update Pack 5 Interim Fix 2 (Build 20230503175608) Note: Several APARs are included in 7.5.0 UP5 IF2, but are waiting on another release before the APARs can be transitioned to CLOSED. Your Console must be installed with QRadar 7.5.0 UP5 or UP5 IF1 to apply this interim fix.

    0 Known issues
    • Upgrade: Upgrades to QRadar 7.5.0 UP5 might take an extended amount of time to complete due to glusterfs file cleanup. You must allow the upgrade to continue uninterrupted.
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Auto update: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • Apps: Before you upgrade, confirm your ftype configuration for Docker services.
    • Apps might go down during the base image update.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support. For more information, see IJ44385.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/04/20 QRadar SIEM 7.4.3 Fix Pack 9 (Build 20230221200405)
    • IJ29512: High Availability (HA) restore process allows a primary to be rebuilt as a secondary 500 appliance
    • IJ43705: QRadar.jsp call to licensekeymanager.arelicensesvalid() causes a delay on login for customers having multiple managed hosts
    • IJ43767: Users patching from QRadar 7.3.2 or 7.4.3 to QRadar 7.5.0 might experience longer patch times than expected
    • IJ44257: Reference data API source response does not reflect the requested API source value
    • IJ44481: Use case manager exports fail while session was in an open transaction state
    • IJ45191: Offense summary page event/flow count field does not match the event count in log activity

    • Note: These issues were closed in 7.5.0 Upgrade Pack 5 and backported to 7.4.3 Fix Pack 9.
    CVE-2022-43863: IBM QRadar SIEM is vulnerable to privilege escalation Important Kernel crash can affect UEFI systems in QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2. If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support or see IJ44385. Fixes delivered on 7.5.0 latest SFS SFS
    2023/03/13 QRadar SIEM 7.5.0 Update Pack 5 (Build 20230301133107) 58 0 Important
    • WinCollect: WinCollect 7.x managed agents must upgrade to WinCollect 7.3.1-28 to resolve APAR IJ45285 where new agents or configuration changes cannot be applied without the new version.
    • Apps: A flash notice exists for this issue that impacts Docker services. Users must confirm ftype configuration before you upgrade.
    • Auto updates: Verify your auto update version after you upgrade as some users reported the version can be reverted to a version prior to 9.16 (latest), leading to auto update problems.
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    • Kernel crash can affect UEFI systems in QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2. If you are planning to upgrade from any version of QRadar 7.4.2 Fix Pack 2 through to QRadar 7.4.3 Fix Pack 2, contact support or see IJ44385.
      Other notices
    • Precheck added for postgresql 11 migration.
    • Fixing browser certificate warnings. In QRadar 7.5.0 Update Package 5, vault has been replaced by QRadar Certificate Authority (CA) and intermediate CA.
    • Upgrading SOAR app might be required.
    • You can now add QNI hosts to the Data Synchronization app.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/02/08 QRadar SIEM 7.5.0 Update Pack 4 Interim Fix 1 (Build 20230203151341) Note: Several APARs are resolved in 7.5.0 UP4 IF1, but are waiting on another release before the APARs can be transitioned to CLOSED.

    IBM QRADAR SIEM IS VULNERABLE TO POSSIBLE INFORMATION DISCLOSURE (CVE-2023-22875) Known issues
    • Important: A flash notice exists for this issue that impacts Docker services. Users must confirm ftype configuration before you upgrade.
    • Important: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    Fixes delivered on 7.5.0 latest SFS SFS
    2023/02/07 QRadar SIEM 7.4.3 Fix Pack 8 (Build 20230202163329) Notes QRadar 7.4.3 Fix Pack 8 runs on Red Hat® Enterprise Linux® version 7.9.

    Known issues
    Fixes delivered on 7.4.3 latest SFS SFS
    2022/12/13 QRadar SIEM 7.5.0 Update Pack 4 (Build 20221129155237) 60 Known issues
    • Important: Flash Notice: After upgrading to 7.5.0 UP4, WinCollect 7.x agents can experience management or configuration change errors (IJ45284)
    • Important: Flash Notice: Before upgrading users must confirm ftype configuration to prevent a potential Docker service issue.
    • Important: Use UpdateConfs.pl -v to confirm your auto update version after you upgrade as it is possible to revert to a previous AU version and experience errors when attmpting to update.
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    • When adding a Data Node to a cluster, they must either all be encrypted, or all be unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
    Fixes delivered on 7.5.0 latest SFS ISO SFS ISO
    2022/10/28 QRadar SIEM 7.5.0 Update Pack 3 Interim Fix 3 (Build 20221025192938) 3 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS SFS
    2022/10/04 QRadar SIEM 7.5.0 Update Pack 3 Interim Fix 2 (Build 20220930210008) 6 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS SFS
    2022/11/14 QRadar SIEM 7.4.3 Fix Pack 7 Interim Fix 1 (Build 20221101201807) 0 CVE-2022-42889 (Update to commons-text 1.10.0) Known issues Repeated ‘ErrorStream’ messages display in qradar.log for appliances communicating over port 22 as described in APAR IJ33650. Notes
  • QRadar 7.4.3 runs on Red Hat Enterprise 7.9.
  • This interim fix includes a single security fix, no APARs are resolved.
  • Latest 7.4.3 version SFS SFS
    2022/09/29 QRadar SIEM 7.4.3 Fix Pack 7 (Build 20220927164102) 11 1 Known issues Repeated ‘ErrorStream’ messages display in qradar.log for appliances communicating over port 22 as described in APAR IJ33650. Fixes delivered on 7.4.3 latest SFS SFS
    2022/09/06 QRadar SIEM 7.5.0 Update Pack 3 (Build 20220829221022) 43 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS ISO SFS ISO
    2022/07/19 QRadar SIEM 7.5.0 Update Pack 2 Interim Fix 2 (Build 20220715185852) IJ37866 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS SFS
    2022/06/13 QRadar SIEM 7.5.0 Update Pack 2 Interim Fix 1 (Build 20220609203147) 1 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS SFS
    2022/06/13 QRadar SIEM 7.4.3 Fix Pack 6 (Build 20220531120920) 15 1 Notes QRadar 7.4.3 Fix Pack 6 runs on Red Hat® Enterprise Linux® version 7.9. Known issues ErrorStream log messages (IJ33650) Fixes delivered on 7.4.3 latest SFS SFS
    2022/06/13 QRadar SIEM 7.3.3 Fix Pack 11 (Build 20220318161607) 0 1 Notes
    • QRadar 7.3.3 Fix Pack 11 runs on Red Hat® Enterprise Linux® version 7.9.
    • QIF deployments must upgrade to QRadar 7.3.1 or later.
    • The Offenses API is updated to include two new fields: first_persisted_time & last_persisted_time.
    • Active Directory module changes.
    Latest 7.3.3 version SFS SFS
    2022/05/30 QRadar SIEM 7.5.0 Update Pack 2 (Build 20220527130137) 47 0 Notes
      Known issues
    • App Host cannot commnicate to Console when connection is firewalled.
    • Apps might go down during base image.
    Fixes delivered on 7.5.0 latest SFS SFS
    2022/03/15 QRadar SIEM 7.4.3 Fix Pack 5 (Build 20220307203834) 24 1 ErrorStream log messages (IJ33650) NAT’d networks cause extended upgrades Fixes delivered on 7.4.3 latest SFS SFS
    2022/02/23 QRadar SIEM 7.5.0 Update Pack 1 (Build 20220215133427) 73 4 Hostcontext service unrestricted JCEs (IJ38233) Fixes delivered on 7.5.0 latest SFS SFS
    2022/02/02 QRadar SIEM 7.5.0 GA (Build 20211220195207) 115 0 Upgrade with removed hosts (IJ36269) WinCollect notice (IJ32896) Fixes delivered on 7.5.0 latest SFS ISO SFS

    Note: ISO removed due to IJ39521, see QRadar 7.5.0 UP3 or later.
    2021/12/20 QRadar SIEM 7.4.3 Fix Pack 4 Interim Fix 2 (Build 20211217105419) 0 2 ‘ErrorStream’ log messages (IJ33650) Notice: This interim fix can only be installed on QRadar 7.4.3 FixPack 4 (20211113154131). If you are on a different level of the QRadar product, you must update your QRadar deployment to 7.4.3 FixPack 4 before installing this interim fix. Fixes delivered on 7.4.3 latest SFS SFS
    2021/12/20 QRadar SIEM 7.3.3 Fix Pack 10 Interim Fix 1 (Build 20210120163940) 0 2 Notice: Active Directory Notice: This interim fix can only be installed on QRadar 7.3.3 FixPack 10 (20211125190208). If you are on a different level of the QRadar product, you must update your QRadar deployment to 7.3.3 FixPack 10 before installing this interim fix. Latest available 7.3.3 version SFS SFS
    2021/11/30 QRadar SIEM 7.3.3 Fix Pack 10 (Build 20211125190208) 3 12 Notice: Active Directory Fixes delivered on 7.3.3 latest SFS SFS
    2021/11/14 QRadar SIEM 7.4.3 Fix Pack 4 (Build 20211109160104) 12 12 Known issue: Managed hosts generate benign errors IJ33650. Fixes delivered on 7.4.3 latest SFS SFS
    2021/10/30 QRadar on Cloud 7.4.3 Fix Pack 3 (Build 20211021121337) 11 12 Important: Version 7.4.3 Fix Pack 3 is only available to QRadar on Cloud users. Known issue: Managed hosts generate benign errors IJ33650. Fixes delivered on 7.4.3 latest SFS Removed
    2021/08/12 QRadar SIEM 7.4.3 Fix Pack 2 (Build 20210810221124) 0 1 QRadar users with domains must install 7.4.3 Fix Pack 2, do not install a prior 7.4.3 version. Fixes delivered on 7.4.3 SFS SFS
    2021/07/22 QRadar SIEM 7.3.3 Fix Pack 9 (Build 20210716155826) 23 6 Notice: Active Directory Fixes delivered on 7.3.3 latest SFS SFS
    2021/07/12 QRadar SIEM 7.4.3 Fix Pack 1 (Build 20210708143944) 30 7 Flash: Support Notice CVE-2021-29880 Known issue: Managed hosts IJ33703 Known issue: Network Activity IJ33511 Known issue: ICMPv6 Flows IJ33201 Fixes delivered on 7.4.3 SFS SFS
    2021/05/24 QRadar SIEM 7.4.3 (Build 20210517144015) 101 0 Flash: Support Notice CVE-2021-29880 Known issue: Service tokens IJ33228 Known issue: CMT import IJ32889 Known issue: CMT import IJ32874 Local Certificate (CA) and SAML Fixes delivered on 7.4.3 SFS ISO SFS ISO
    2021/05/03 QRadar SIEM 7.3.3 Fix Pack 8 (Build 20210427222138) 23 9 Notice: Active Directory Fixes delivered on 7.3.3 SFS SFS
    2021/04/12 QRadar SIEM 7.4.2 Fix Pack 3 (Build 20210323172312) 11 11 Known issue: Adding Managed Hosts (IJ32056) Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2021/04/12 QRadar SIEM 7.3.3 Fix Pack 7 Interim Fix 2 (20210330030509) 0 2 Notice: Active Directory Fixes delivered on 7.3.3 SFS SFS
    2021/01/27 QRadar SIEM 7.3.3 Fix Pack 7 Interim Fix 1 (20210120163940) 0 1 UBA app: IJ29455 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.3.3 SFS SFS
    2021/01/26 QRadar SIEM 7.4.2 Fix Pack 2 (Build 20210120225428) 31 9 UBA app: IJ29455 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2021/01/12 QRadar SIEM 7.4.2 Fix Pack 1 (Build 20210105144619) 1 0 UBA app: IJ29455 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2021/01/12 QRadar SIEM 7.3.3 Fix Pack 7 (Build 20210111145446) 16 0 Notice: Active Directory Fixes delivered on 7.3.3 SFS SFS
    2020/12/14 QRadar SIEM 7.3.3 Fix Pack 6 (Build 20201205215722) 17 4 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.3.3 SFS SFS
    2020/11/26 QRadar SIEM 7.4.2 (Build 20201113144954) 89 2 UBA app: IJ29455 Notice: Auto update Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS ISO SFS ISO
    2020/12/03 QRadar SIEM 7.4.1 Fix Pack 2 (Build 20201112005343) 17 4 Known issue: IJ29294 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2020/10/21 QRadar SIEM 7.4.1 Fix Pack 1 Interim Fix 1 (20201018191117) 1 0 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2020/10/07 QRadar SIEM 7.3.3 Fix Pack 5 (Build 20200929154613) 12 7 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.3.3 SFS SFS
    2020/09/18 QRadar SIEM 7.4.1 Fix Pack 1 (Build 20200915010309) 14 8 Notice: Active Directory Notice: Risk Manager CSM Fixes delivered on 7.4.3 SFS SFS
    2018/11/29 QRadar SIEM 7.3.1 Patch 7 (Build 20181123182336) 29 7 0 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2019/03/19 QRadar SIEM 7.3.1 Patch 8 (Build 20190228154648) 39 0 0 Fixes delivered on 7.3.3 SFS SFS
    2020/08/06 QRadar SIEM 7.4.1 (Build 20200716115107) 92 0 None Fixes delivered on 7.4.3 SFS ISO SFS ISO
    2020/07/08 QRadar SIEM 7.4.0 Fix Pack 4 (Build 20200629201233) 2 0 None Fixes delivered on 7.4.3 SFS Download
    2020/06/15 QRadar SIEM 7.4.0 Fix Pack 3 (Build 20200606144505) 13 7 Fixes delivered on 7.4.3 SFS Download
    2020/04/30 QRadar SIEM 7.4.0 Fix Pack 2 (Build 20200426161706) 4 0 Offenses: IJ24819 Fixes delivered on 7.4.3 SFS Download
    2020/04/13 QRadar SIEM 7.4.0 Fix Pack 1 (Build 20200409095210) 22 0 Offenses: IJ24334 QVM tunnels: IJ24430 Fixes delivered on 7.4.3 SFS Download
    2020/07/13 QRadar SIEM 7.3.3 Fix Pack 4 (Build 20200704141002) 15 7 None Fixes delivered on 7.3.3 SFS Download
    2020/04/29 QRadar SIEM 7.3.3 Fix Pack 3 Interim Fix 1 (Build 20200427135149) 1 0 Offense: IJ24334 Fixes delivered on 7.3.3 SFS Download
    2020/03/16 QRadar SIEM 7.4.0 (Build 20200304205308) 73 12 Event Collectors: IJ23194 Fixes delivered on 7.4.3 SFS ISO SFS ISO
    2020/04/28 QRadar SIEM 7.4.0 Fix Pack 1 Interim Fix 1 (Build 20200424160445) 1 0 Offenses: IJ24819 Fixes delivered on 7.4.3 SFS Download
    2020/04/13 QRadar SIEM 7.3.3 Fix Pack 3 (Build 20200409085709) 20 8 Offenses: IJ24334 QVM tunnels: IJ24430 Fixes delivered on 7.3.3 SFS Download
    2020/02/13 QRadar SIEM 7.3.3 Fix Pack 2 (Build 20200208135728) 11 4 None Fixes delivered on 7.3.3 SFS Download
    2019/12/21 QRadar SIEM 7.3.3 Fix Pack 1 Interim Fix 1 (Build 20191220154048) 1 0 Flash notice: IJ21718 Fixes delivered on 7.3.3 SFS Download
    2019/12/09 QRadar SIEM 7.3.3 Fix Pack 1 (Build 20191203144110) 25 6 Flash notice: IJ21718 Fixes delivered on 7.3.3 SFS Download
    2019/11/26 QRadar SIEM 7.3.3 (Build 20191031163225) 53 4 Flash notice: IJ21718 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2020/04/13 QRadar SIEM 7.3.2 Fix Pack 7 (Build 20200406171249) 9 13 None Fixes delivered on 7.3.3 SFS Download
    2020/01/09 QRadar SIEM 7.3.2 Fix Pack 6 (Build 20191224145010) 23 6 None Fixes delivered on 7.3.3 SFS Download
    2019/12/21 QRadar SIEM 7.3.2 Fix Pack 5 Interim Fix 1 (Build 20191220232616) 1 0 None Fixes delivered on 7.3.3 SFS Download
    2019/11/05 QRadar SIEM 7.3.2 Fix Pack 5 (Build 20191022133252) 18 9 Flash notice: IJ21718 Fixes delivered on 7.3.3 SFS Download
    2019/08/15 QRadar SIEM 7.3.2 Fix Pack 4 (Build 20190803012943) 23 1 Backup/Recovery: IJ18357 Managed hosts: IJ20148 Fixes delivered on 7.3.3 SFS Download
    2019/08/15 QRadar SIEM 7.3.2 Fix Pack 3 (Build 20190705120852) 70 0 Flash notice: IJ18032 Access & authentication: IJ17937 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2019/07/12 QRadar SIEM 7.3.2 Fix Pack 2 Interim Fix 2 (Build 20190710135412) 1 0 None Fixes delivered on 7.3.3 SFS Download
    2019/07/05 QRadar SIEM 7.3.2 Fix Pack 2 Interim Fix 1 (Build 20190617171807) 3 0 None Fixes delivered on 7.3.3 SFS Download
    2019/05/30 QRadar SIEM 7.3.2 Fix Pack 2 (Build 20190522204210) 27 5 Installation: IJ16494 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2019/04/15 QRadar SIEM 7.3.2 Fix Pack 1 (Build 20190410024210) 25 5 Kernel: IJ14841 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2019/04/04 QRadar SIEM 7.3.2 Fix Pack 0 (GA) Interim Fix 2 (Build 20190403170335) None CVE-2019-4210 None Fixes delivered on 7.3.3 SFS Download
    2019/03/28 QRadar SIEM 7.3.2 Fix Pack 0 (GA) Interim Fix 1 (Build 20190322185336) IJ14947 None Fixes delivered on 7.3.3 SFS Download
    2019/02/11 QRadar SIEM 7.3.2 Fix Pack 0 (GA) (Build 20190201201121) 32 CVE-2019-4210 Kernel: IJ14841 Fixes delivered on 7.3.3 SFS ISO SFS ISO
    2019/07/10 QRadar SIEM 7.2.8 Patch 16 (7.2.8.20190703194519) 1 9 0 End of Support as 09/25/2019 SFS SFS
    2019/10/03 QRadar SIEM 7.2.8 Patch 17 (7.2.8.20190910154321) 0 3 0 End of Support as 09/25/2019 SFS SFS

    Explore QRadar 101

    QRadar home

    Return to the QRadar 101 homepage

    Applications

    Learn about QRadar apps

    Deploy changes

    Learn about deploying changes to QRadar

    Disk Space

    Learn about managing QRadar disk space

    Technotes

    Browse a directory of our technical notes

    Support Assistance

    Read our support policies

    Support tools

    Browse CLI tools to help with troubleshooting

    WinCollect

    Learn about WinCollect 7 and 10

    Installs and Upgrades

    Learn about installing and upgrading QRadar

    Known issues

    See current and fixed issues with QRadar


    IBM prides itself on delivering world class software support with highly skilled, customer-focused people.


    Return to 101 home
    Contact Support Find your regional support contact