Skip to main content

CVE-2022-35719: CWE-532 Insertion of Sensitive Information into Log File in IBM MQ Internet Pass-Thru

Medium
Published: Mon Nov 14 2022 (11/14/2022, 16:45:42 UTC)
Source: CVE
Vendor/Project: IBM
Product: MQ Internet Pass-Thru

Description

IBM MQ Internet Pass-Thru 2.1, 9.2 LTS and 9.2 CD stores potentially sensitive information in trace files that could be read by a local user.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:42:47 UTC

Technical Analysis

CVE-2022-35719 is a vulnerability identified in IBM MQ Internet Pass-Thru versions 2.1, 9.2 LTS, and 9.2 CD. The issue involves the improper handling of sensitive information within trace log files generated by the product. Specifically, sensitive data such as authentication credentials, session tokens, or other confidential information may be inadvertently recorded in trace files. These files are typically used for debugging and monitoring but, if accessible to unauthorized local users, can lead to information disclosure. The vulnerability is classified under CWE-532, which pertains to the insertion of sensitive information into log files. Exploitation requires local access to the system where IBM MQ Internet Pass-Thru is running, as the sensitive data is exposed through trace files stored on the local file system. There is no indication that remote exploitation or user interaction is necessary. No known exploits have been reported in the wild, and IBM has not published specific patches for this issue as of the provided data. The vulnerability primarily impacts confidentiality, as unauthorized local users could gain access to sensitive credentials or data, potentially enabling further privilege escalation or lateral movement within the affected environment.

Potential Impact

For European organizations, the impact of CVE-2022-35719 can be significant depending on the deployment scale of IBM MQ Internet Pass-Thru. IBM MQ is widely used in enterprise environments for secure and reliable message queuing, often within critical infrastructure, financial institutions, and large-scale manufacturing sectors prevalent in Europe. Exposure of sensitive information through log files could lead to unauthorized access to messaging systems, potentially compromising data integrity and confidentiality. This may result in data breaches, disruption of business processes, or compliance violations under regulations such as GDPR, which mandates strict controls over personal and sensitive data. The vulnerability's requirement for local access limits the attack vector to insiders or attackers who have already gained some foothold in the network, but it can facilitate privilege escalation or lateral movement, increasing the overall risk posture. Organizations with complex, multi-tiered messaging architectures or those relying heavily on IBM MQ for inter-system communication are particularly at risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict access to systems running IBM MQ Internet Pass-Thru to trusted personnel only, enforcing strict access controls and monitoring for unauthorized local access attempts. 2) Review and harden file system permissions on directories containing trace files to ensure that only authorized users and processes can read these logs. 3) Disable or limit trace logging in production environments unless necessary for troubleshooting, and ensure that trace files are securely stored and regularly purged. 4) Implement centralized log management solutions that can securely collect and manage logs without exposing sensitive information locally. 5) Conduct regular audits of logging configurations and sensitive data handling policies to detect and remediate inadvertent logging of confidential information. 6) Monitor for unusual local user activity that could indicate attempts to access sensitive trace files. 7) Engage with IBM support or security advisories to obtain any forthcoming patches or updates addressing this vulnerability and apply them promptly. 8) Educate system administrators and security teams about the risks associated with sensitive data in logs and best practices for secure logging.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2022-07-12T21:29:42.718Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefde4

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:42:47 PM

Last updated: 7/31/2025, 6:35:13 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats