EUVD-2025-209023

| CVE-2025-36258 HIGH
2026-03-25 ibm GHSA-ppqh-5g92-f826
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
EUVD ID Assigned
Mar 25, 2026 - 20:47 euvd
EUVD-2025-209023
Analysis Generated
Mar 25, 2026 - 20:47 vuln.today
Patch Released
Mar 25, 2026 - 20:47 nvd
Patch available
CVE Published
Mar 25, 2026 - 20:25 nvd
HIGH 7.1

Description

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user credentials and other sensitive information in plain text which can be read by a local user.

Analysis

IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 store user credentials and other sensitive information in plain text, allowing local users to read this data. This is a high-severity information disclosure vulnerability with a CVSS score of 7.1, primarily due to the potential for complete confidentiality breach across security boundaries. A patch is available from IBM, and there is no evidence of active exploitation or public proof-of-concept at this time.

Technical Context

IBM InfoSphere Information Server is an enterprise data integration and governance platform used for ETL (extract, transform, load) operations and master data management. The vulnerability stems from CWE-256 (Plaintext Storage of a Password), indicating that the application persists sensitive credentials and potentially other confidential data in unencrypted form on the filesystem or in configuration files. The affected product is identified via CPE cpe:2.3:a:ibm:infosphere_information_server spanning all versions from 11.7.0.0 through 11.7.1.6. This type of vulnerability typically arises from insufficient application of cryptographic protections during credential storage, making the data readable by any user with local filesystem access.

Affected Products

IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 are affected by this vulnerability. The affected product range is confirmed via CPE identifier cpe:2.3:a:ibm:infosphere_information_server. IBM has published a vendor security advisory with detailed patch information available at https://www.ibm.com/support/pages/node/7266489. All deployments running any version within the specified range should be considered vulnerable until remediation is applied.

Remediation

Apply the security patch provided by IBM as documented in the vendor advisory at https://www.ibm.com/support/pages/node/7266489. The advisory contains specific upgrade instructions and patch files for InfoSphere Information Server 11.7.x versions. Until patching can be completed, implement compensating controls including strict filesystem permissions to limit local access to InfoSphere installation directories, enhanced monitoring for unauthorized access to credential storage locations, and segregation of InfoSphere servers to prevent untrusted local users from gaining access. Review and rotate any credentials that may have been stored in plain text to prevent potential abuse of previously exposed data.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

EUVD-2025-209023 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy