Skip to main content

CVE-2025-0923: CWE-540 Inclusion of Sensitive Information in Source Code in IBM Cognos Analytics

Medium
VulnerabilityCVE-2025-0923cvecve-2025-0923cwe-540
Published: Wed Jun 11 2025 (06/11/2025, 17:28:57 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics

Description

IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 stores source code on the web server that could aid in further attacks against the system.

AI-Powered Analysis

AILast updated: 07/12/2025, 09:16:16 UTC

Technical Analysis

CVE-2025-0923 is a medium-severity vulnerability affecting multiple versions of IBM Cognos Analytics, specifically versions 11.2.0 through 11.2.4 and 12.0.0 through 12.0.4. The vulnerability is categorized under CWE-540, which involves the inclusion of sensitive information in source code. In this case, IBM Cognos Analytics stores source code on the web server in a manner that could inadvertently expose sensitive information. This exposure can provide attackers with valuable insights into the internal workings of the application, potentially facilitating further attacks such as code injection, privilege escalation, or unauthorized data access. The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) shows that the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it only impacts confidentiality with limited data exposure and does not affect integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the presence of source code on the web server can be a significant risk, especially if the source code contains hardcoded credentials, business logic, or other sensitive data that attackers can leverage to craft more sophisticated attacks or bypass security controls.

Potential Impact

For European organizations using IBM Cognos Analytics in the affected versions, this vulnerability poses a risk of sensitive information leakage that could undermine the confidentiality of business-critical data. Since Cognos Analytics is widely used for business intelligence and reporting, exposure of source code could reveal internal query structures, data schemas, or embedded credentials, potentially leading to unauthorized data access or lateral movement within the network. This risk is particularly acute for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe. The vulnerability's remote and unauthenticated exploitability increases the attack surface, making it easier for external threat actors to probe and gather intelligence without needing prior access. While the vulnerability does not directly impact system integrity or availability, the information disclosure could be a stepping stone for more damaging attacks. Given the GDPR and other data protection regulations in Europe, any leakage of sensitive information could also result in regulatory penalties and reputational damage.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Immediately review and restrict access to the web server directories hosting IBM Cognos Analytics source code to prevent unauthorized access. 2) Conduct a thorough audit of the source code stored on the server to identify and remove any hardcoded credentials, sensitive business logic, or confidential information. 3) Monitor network traffic and server logs for unusual access patterns that may indicate attempts to access exposed source code. 4) Apply strict network segmentation and firewall rules to limit exposure of the Cognos Analytics web server to only trusted internal networks or VPN users. 5) Engage with IBM support or security advisories to obtain and apply patches or updates once they become available. 6) Implement a secure development lifecycle practice that avoids storing sensitive information in source code or accessible locations. 7) Consider deploying web application firewalls (WAF) with custom rules to detect and block attempts to access source code files. 8) Educate administrators and developers about the risks of sensitive information exposure and enforce secure configuration baselines for IBM Cognos Analytics deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-31T01:57:18.370Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849bfa7527d26c5b90cca12

Added to database: 6/11/2025, 5:40:55 PM

Last enriched: 7/12/2025, 9:16:16 AM

Last updated: 8/5/2025, 11:28:19 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats