EUVD-2025-209018

| CVE-2025-14810 MEDIUM
2026-03-25 ibm GHSA-68qv-w55v-9mrv
6.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
EUVD ID Assigned
Mar 25, 2026 - 20:32 euvd
EUVD-2025-209018
Analysis Generated
Mar 25, 2026 - 20:32 vuln.today
Patch Released
Mar 25, 2026 - 20:32 nvd
Patch available
CVE Published
Mar 25, 2026 - 20:11 nvd
MEDIUM 6.3

Description

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate a session after privileges have been modified which could allow an authenticated user to retain access to sensitive information. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE: CWE-613: Insufficient Session Expiration CVSS Source: IBM CVSS Base score: 6.3 CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Analysis

IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 fail to invalidate user sessions when administrative privileges are revoked, allowing authenticated users to retain access to sensitive information they should no longer be able to access. The vulnerability affects the session management layer and requires an authenticated attacker with initial system access. A patch is available from IBM, and this represents a privilege escalation and information disclosure risk in enterprise data integration environments.

Technical Context

This vulnerability stems from insufficient session expiration handling (CWE-613) in the IBM InfoSphere Information Server application, which is an enterprise data integration and metadata management platform. The root cause is that the application does not properly invalidate or refresh session tokens when a user's access control list (ACL) or role assignments are modified by administrators. In secure session management, privilege changes should trigger immediate session termination and re-authentication, forcing the system to recalculate authorization boundaries. Instead, InfoSphere Information Server allows the session to persist with cached privilege information, enabling users to bypass newly-applied restrictions. This affects versions spanning the 11.7.x branch (11.7.0.0 through 11.7.1.6 per CPE cpe:2.3:a:ibm:infosphere_information_server) and represents a foundational flaw in how the application manages the relationship between session state and dynamic privilege changes.

Affected Products

IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 are affected, as confirmed by CPE cpe:2.3:a:ibm:infosphere_information_server. The vulnerability has been documented by IBM with a patch available. See the vendor security advisory for detailed version information and patch applicability at https://www.ibm.com/support/pages/node/7266696.

Remediation

Apply the security patch provided by IBM for InfoSphere Information Server immediately. Organizations using versions 11.7.0.0 through 11.7.1.6 should upgrade to the patched version specified in the IBM security bulletin at https://www.ibm.com/support/pages/node/7266696. Until patches can be deployed, implement compensating controls by enforcing mandatory session re-authentication (15-30 minute session timeout) and implementing real-time privilege change notifications to users with an automated logout trigger on privilege modification. Additionally, monitor session activity logs for privilege changes and correlate with subsequent data access events to detect attempted exploitation. Restrict network access to the InfoSphere Information Server console to trusted administrative IP ranges and enforce multi-factor authentication for all administrative accounts managing user roles.

Priority Score

32
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Share

EUVD-2025-209018 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy