CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Lifecycle Timeline
4Description
IBM Concert 1.0.0 through 2.2.0 creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.
Analysis
IBM Concert versions 1.0.0 through 2.2.0 create temporary files with predictable names, allowing local unauthenticated attackers to overwrite arbitrary files through symlink attacks. An attacker with local system access can exploit this insecure temporary file handling to modify critical application or system files, achieving high integrity impact. No public exploit code or active exploitation has been confirmed at time of analysis.
Technical Context
This vulnerability stems from inadequate temporary file creation practices, classified under CWE-340 (Generation of Predictable Numbers or Identifiers). When IBM Concert generates temporary files during operation, it uses predictable naming schemes without proper protections against symlink attacks. A local attacker can predict the temporary file path, create a symbolic link to a target file in advance, and when the application writes to the predictable temporary file location, the symlink causes the actual write operation to target an arbitrary file the attacker specifies. This is a classic TOCTOU (time-of-check-time-of-use) variant affecting local file operations. The affected product is IBM Concert, a collaboration and integration platform, across all versions from 1.0.0 through 2.2.0 (CPE: cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:*).
Affected Products
IBM Concert versions 1.0.0 through 2.2.0 are affected (CPE: cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:*). The vendor advisory is available at https://www.ibm.com/support/pages/node/7268620, which contains the definitive list of affected releases and patched versions.
Remediation
Upgrade IBM Concert to the patched version released by IBM. Organizations should consult the vendor advisory at https://www.ibm.com/support/pages/node/7268620 for the specific fixed release version applicable to their deployment. As an interim mitigation, restrict local system access to IBM Concert installation and temporary file directories to trusted users only, and monitor file system activity for suspicious symlink creation in temporary directories. Ensure the host operating system enforces secure temporary file creation protections if available (e.g., restrictive umask, secure tmpdir implementations).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209253
GHSA-32vv-mwc8-ch6p