EUVD-2025-19079

| CVE-2025-0966 HIGH
2025-06-25 [email protected]
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2025-19079
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
CVE Published
Jun 25, 2025 - 03:15 nvd
HIGH 7.6

Description

IBM InfoSphere Information Server 11.7 vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.

Analysis

CVE-2025-0966 is a SQL injection vulnerability in IBM InfoSphere Information Server 11.7 that allows authenticated remote attackers to execute arbitrary SQL commands against the backend database. An attacker with valid credentials can view, add, modify, or delete sensitive information without administrative privileges. The vulnerability carries a CVSS score of 7.6 (High) and requires low attack complexity, making it a significant risk for organizations using affected versions.

Technical Context

This vulnerability stems from CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a classic SQL injection flaw where user-controlled input is concatenated into SQL queries without proper parameterization or input validation. IBM InfoSphere Information Server 11.7 fails to sanitize crafted SQL statements before passing them to the backend database engine. The affected component likely resides in the application's data query interface, request handler, or reporting module that constructs dynamic SQL queries. Without prepared statements or parameterized queries, attackers can manipulate query logic by injecting SQL metacharacters and commands.

Affected Products

IBM InfoSphere Information Server version 11.7 is explicitly vulnerable. The CPE would be: cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*. Organizations should verify if additional versions (11.5, 11.6, 11.8, or 12.x) are affected via IBM's official security bulletin. Affected configurations include deployments with database backends (Db2, SQL Server, Oracle) accessible through the InfoSphere application tier.

Remediation

Immediate actions: (1) Apply IBM security patches for InfoSphere Information Server 11.7 when released—check IBM Security Advisories (https://www.ibm.com/support/pages/security-bulletins) for the specific fix version; (2) If patches are unavailable, restrict network access to InfoSphere services using firewall rules, limiting connections to trusted IP ranges; (3) Implement strict input validation and output encoding at the application layer; (4) Migrate to patched versions (likely 11.7.1+ or newer stable release); (5) Apply principle of least privilege to database service accounts used by InfoSphere; (6) Monitor database query logs for suspicious SQL patterns (e.g., UNION, stacked queries, comments). Long-term: upgrade to current InfoSphere versions with security hardening.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-19079 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy