Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33150: CWE-552 Files or Directories Accessible to External Parties in IBM Cognos Analytics Certified Containers

0
Medium
VulnerabilityCVE-2025-33150cvecve-2025-33150cwe-552
Published: Mon Nov 10 2025 (11/10/2025, 19:33:55 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics Certified Containers

Description

CVE-2025-33150 is a medium-severity vulnerability in IBM Cognos Analytics Certified Containers version 12. 1. 0 that allows unauthorized external parties to access hidden pages disclosing package parameter information. The vulnerability stems from improper access controls on files or directories, categorized under CWE-552. It requires no authentication or user interaction and can be exploited remotely over the network. While it does not impact integrity or availability, the confidentiality of sensitive configuration or parameter data is compromised. No known exploits are currently reported in the wild, and no patches have been published yet. European organizations using this IBM product, especially in finance, government, and large enterprises, should be aware of potential information disclosure risks. Mitigation involves restricting external access to container resources, applying strict network segmentation, and monitoring for unusual access patterns. Countries with significant IBM Cognos deployments and critical infrastructure reliance on analytics platforms, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 11/17/2025, 20:12:27 UTC

Technical Analysis

CVE-2025-33150 identifies a vulnerability in IBM Cognos Analytics Certified Containers version 12.1.0 where hidden pages within the containerized environment expose package parameter information to unauthorized external parties. This issue is classified under CWE-552, which involves files or directories being accessible to external parties without proper authorization. The vulnerability arises because the containerized deployment does not adequately restrict access to certain internal resources, allowing remote attackers to retrieve sensitive configuration details without requiring authentication or user interaction. The CVSS 3.1 base score is 5.3, reflecting a medium severity primarily due to confidentiality impact (partial disclosure of package parameters) with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component. Although no exploits have been reported in the wild and no patches are currently available, the exposure of internal parameters could aid attackers in further reconnaissance or crafting targeted attacks against IBM Cognos Analytics deployments. The vulnerability specifically affects version 12.1.0 of the Certified Containers product, which is used by organizations deploying IBM Cognos Analytics in containerized environments for business intelligence and analytics workloads.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive package parameter information within IBM Cognos Analytics Certified Containers. Such information could include configuration details that might facilitate further attacks or unauthorized access. While the vulnerability does not directly affect data integrity or system availability, the confidentiality breach could undermine trust in analytics platforms and expose internal deployment details. This is particularly critical for sectors handling sensitive data such as finance, government, healthcare, and large enterprises relying on IBM Cognos for decision-making. Attackers could leverage disclosed information for reconnaissance, potentially leading to more severe attacks like privilege escalation or data exfiltration. The lack of authentication and user interaction requirements increases the risk of remote exploitation. Given the widespread use of IBM Cognos Analytics in Europe, especially in countries with mature IT infrastructures, the impact could be significant if not mitigated promptly.

Mitigation Recommendations

To mitigate CVE-2025-33150, European organizations should implement the following specific measures: 1) Restrict network access to IBM Cognos Analytics Certified Containers by enforcing strict firewall rules and network segmentation, limiting exposure only to trusted internal networks. 2) Review and harden container configurations to ensure that hidden pages or internal resources are not accessible externally. 3) Implement access control policies that prevent unauthorized external parties from reaching sensitive container endpoints. 4) Monitor network traffic and container logs for unusual access patterns or attempts to retrieve hidden pages. 5) Engage with IBM support to obtain any forthcoming patches or updates addressing this vulnerability and apply them promptly once available. 6) Conduct regular security assessments and penetration testing focused on containerized analytics environments to identify and remediate similar misconfigurations. 7) Educate DevOps and security teams on secure container deployment best practices, emphasizing the importance of minimizing exposed surfaces. These targeted actions go beyond generic advice by focusing on container-specific access controls and monitoring tailored to IBM Cognos Analytics deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:51:29.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69124159941466772c4b1f91

Added to database: 11/10/2025, 7:47:37 PM

Last enriched: 11/17/2025, 8:12:27 PM

Last updated: 12/24/2025, 10:07:36 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats