CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Lifecycle Timeline
4Description
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user credentials and other sensitive information in plain text which can be read by a local user.
Analysis
IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 store user credentials and other sensitive information in plain text, allowing local users to read this data. This is a high-severity information disclosure vulnerability with a CVSS score of 7.1, primarily due to the potential for complete confidentiality breach across security boundaries. A patch is available from IBM, and there is no evidence of active exploitation or public proof-of-concept at this time.
Technical Context
IBM InfoSphere Information Server is an enterprise data integration and governance platform used for ETL (extract, transform, load) operations and master data management. The vulnerability stems from CWE-256 (Plaintext Storage of a Password), indicating that the application persists sensitive credentials and potentially other confidential data in unencrypted form on the filesystem or in configuration files. The affected product is identified via CPE cpe:2.3:a:ibm:infosphere_information_server spanning all versions from 11.7.0.0 through 11.7.1.6. This type of vulnerability typically arises from insufficient application of cryptographic protections during credential storage, making the data readable by any user with local filesystem access.
Affected Products
IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 are affected by this vulnerability. The affected product range is confirmed via CPE identifier cpe:2.3:a:ibm:infosphere_information_server. IBM has published a vendor security advisory with detailed patch information available at https://www.ibm.com/support/pages/node/7266489. All deployments running any version within the specified range should be considered vulnerable until remediation is applied.
Remediation
Apply the security patch provided by IBM as documented in the vendor advisory at https://www.ibm.com/support/pages/node/7266489. The advisory contains specific upgrade instructions and patch files for InfoSphere Information Server 11.7.x versions. Until patching can be completed, implement compensating controls including strict filesystem permissions to limit local access to InfoSphere installation directories, enhanced monitoring for unauthorized access to credential storage locations, and segregation of InfoSphere servers to prevent untrusted local users from gaining access. Review and rotate any credentials that may have been stored in plain text to prevent potential abuse of previously exposed data.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209023
GHSA-ppqh-5g92-f826