Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36105: CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable in IBM Planning Analytics Advanced Certified Containers

0
Medium
VulnerabilityCVE-2025-36105cvecve-2025-36105cwe-526
Published: Tue Mar 10 2026 (03/10/2026, 00:50:05 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Planning Analytics Advanced Certified Containers

Description

CVE-2025-36105 is a medium-severity vulnerability affecting IBM Planning Analytics Advanced Certified Containers versions 3. 1. 0 through 3. 1. 4. It involves the cleartext storage of sensitive information within environment variables, which can be accessed by a local privileged user. The vulnerability does not require user interaction but does require local privileged access to exploit. Exploitation could lead to unauthorized disclosure of sensitive data, impacting confidentiality without affecting integrity or availability. No known exploits are currently reported in the wild. Organizations using affected IBM Planning Analytics containers should prioritize restricting local privileged access and monitor for suspicious activity.

AI-Powered Analysis

AILast updated: 03/10/2026, 01:33:37 UTC

Technical Analysis

CVE-2025-36105 is a vulnerability identified in IBM Planning Analytics Advanced Certified Containers versions 3.1.0 through 3.1.4. The issue stems from the cleartext storage of sensitive information in environment variables within the containerized environment. Environment variables are often used to store configuration data, including credentials or tokens, but storing sensitive data in cleartext increases the risk of exposure. A local privileged user—someone with elevated permissions on the host or container environment—can access these environment variables and extract sensitive information. The vulnerability is classified under CWE-526, which relates to cleartext storage of sensitive information. The CVSS v3.1 score is 4.4 (medium), reflecting that exploitation requires local privileged access but can lead to high confidentiality impact. There is no requirement for user interaction, and the vulnerability does not impact integrity or availability. No public exploits or active exploitation have been reported. The vulnerability was published in March 2026, with IBM as the vendor and assigner. The lack of available patches at the time of reporting suggests organizations should implement compensating controls until updates are released.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information stored in environment variables. If a local privileged user is compromised or malicious, they could extract credentials, tokens, or other confidential data, which could then be used to escalate privileges, move laterally within the network, or access other sensitive systems. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach could lead to broader security incidents, including data breaches or compliance violations. Organizations relying on IBM Planning Analytics Advanced Certified Containers in environments with multiple users or shared infrastructure are at higher risk. The requirement for local privileged access limits remote exploitation but does not eliminate risk from insider threats or attackers who have already gained elevated access.

Mitigation Recommendations

1. Restrict local privileged access strictly to trusted administrators and monitor for unauthorized privilege escalations. 2. Implement robust access controls and auditing on systems running IBM Planning Analytics containers to detect suspicious access to environment variables. 3. Avoid storing sensitive information in environment variables; use secure secret management solutions or encrypted storage mechanisms instead. 4. Apply vendor patches or updates promptly once available to address this vulnerability directly. 5. Employ container security best practices, including minimizing container privileges and isolating workloads. 6. Conduct regular security reviews and penetration testing focusing on container environments to identify and remediate similar issues. 7. Use runtime security tools that can detect anomalous access to environment variables or sensitive data within containers. 8. Educate administrators and users about the risks of local privilege misuse and enforce strict operational security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:16.298Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af7192ea502d3aa8ea5c71

Added to database: 3/10/2026, 1:19:14 AM

Last enriched: 3/10/2026, 1:33:37 AM

Last updated: 3/10/2026, 4:56:15 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses