Skip to main content

CVE-2025-0923: CWE-540 Inclusion of Sensitive Information in Source Code in IBM Cognos Analytics

Medium
VulnerabilityCVE-2025-0923cvecve-2025-0923cwe-540
Published: Wed Jun 11 2025 (06/11/2025, 17:28:57 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics

Description

IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 stores source code on the web server that could aid in further attacks against the system.

AI-Powered Analysis

AILast updated: 08/25/2025, 00:37:18 UTC

Technical Analysis

CVE-2025-0923 is a medium severity vulnerability affecting multiple versions of IBM Cognos Analytics, specifically versions 11.2.0 through 11.2.4 and 12.0.0 through 12.0.4. The vulnerability is categorized under CWE-540, which involves the inclusion of sensitive information in source code. In this case, IBM Cognos Analytics stores source code on the web server in a manner that could be accessed by unauthorized users. This exposure of source code can provide attackers with valuable insights into the internal workings of the application, potentially revealing sensitive logic, credentials, or configuration details that could be leveraged to mount further attacks against the system. The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The vector indicates that the vulnerability is remotely exploitable over the network without requiring privileges or user interaction (AV:N/AC:L/PR:N/UI:N), and it impacts confidentiality (C:L) but not integrity or availability. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that mitigation may rely on configuration changes or vendor updates once available. The exposure of source code on a web server is a significant security concern because it can facilitate reconnaissance and exploitation by attackers, increasing the risk of subsequent attacks such as privilege escalation, data exfiltration, or unauthorized access.

Potential Impact

For European organizations using IBM Cognos Analytics, this vulnerability poses a risk primarily to the confidentiality of sensitive business intelligence data and internal application logic. Cognos Analytics is widely used in sectors such as finance, manufacturing, healthcare, and government, where sensitive data is processed and analyzed. Exposure of source code could allow attackers to identify weaknesses or hardcoded credentials, leading to unauthorized access or data breaches. Given the remote and unauthenticated nature of the vulnerability, attackers could exploit it without needing prior access or user interaction, increasing the threat level. This could result in loss of competitive advantage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and reputational damage. The impact is heightened in environments where Cognos Analytics is integrated with other critical systems or where sensitive personal or financial data is processed. However, since the vulnerability does not affect integrity or availability directly, the immediate operational disruption risk is lower, but the confidentiality breach risk remains significant.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediately review and restrict access controls on the web server hosting IBM Cognos Analytics to ensure that source code files are not publicly accessible or exposed to unauthorized users. 2) Implement web server configuration hardening to prevent directory listing and unauthorized file access, including disabling access to source code directories or files. 3) Monitor web server logs for unusual access patterns that might indicate attempts to retrieve source code or sensitive files. 4) Engage with IBM support or security advisories to obtain patches or official guidance as soon as they become available and apply them promptly. 5) Conduct a thorough security audit of the Cognos Analytics deployment to identify any other potential information leakage or misconfigurations. 6) Employ network segmentation to isolate the Cognos Analytics server from less trusted networks and limit exposure. 7) Educate administrators and developers on secure coding and deployment practices to avoid embedding sensitive information in source code or configuration files accessible via the web server. These targeted actions go beyond generic advice by focusing on access control, monitoring, and vendor engagement specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-31T01:57:18.370Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849bfa7527d26c5b90cca12

Added to database: 6/11/2025, 5:40:55 PM

Last enriched: 8/25/2025, 12:37:18 AM

Last updated: 9/21/2025, 8:56:08 AM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats