Skip to main content

CVE-2025-36106: CWE-326 Inadequate Encryption Strength in IBM Cognos Analytics Mobile

Medium
VulnerabilityCVE-2025-36106cvecve-2025-36106cwe-326
Published: Mon Jul 21 2025 (07/21/2025, 18:08:09 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics Mobile

Description

IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to view and modify information coming to and from the application which could then be used to access confidential information on the device or network by using a the deprecated or misconfigured AFNetworking library at runtime.

AI-Powered Analysis

AILast updated: 07/21/2025, 18:46:09 UTC

Technical Analysis

CVE-2025-36106 is a vulnerability identified in IBM Cognos Analytics Mobile for iOS versions 1.1.0 through 1.1.22. The issue stems from the use of a deprecated or misconfigured AFNetworking library at runtime, which results in inadequate encryption strength (classified under CWE-326). This weakness allows malicious actors to intercept and potentially modify data transmitted between the mobile application and backend services. Specifically, the vulnerability enables attackers to view and alter information in transit, which could lead to unauthorized access to confidential information stored on the device or accessible through the network. The vulnerability does not require user interaction or authentication, but it does have a high attack complexity, meaning that exploitation is not trivial and may require specific conditions or skills. The CVSS v3.1 base score is 6.5 (medium severity), reflecting a high impact on confidentiality, limited impact on integrity, and no impact on availability. The vulnerability affects the confidentiality of sensitive business intelligence data handled by IBM Cognos Analytics Mobile, potentially exposing sensitive corporate analytics and reports to unauthorized parties. Since the vulnerability is related to encryption strength and transport security, it primarily threatens data confidentiality during communication sessions between the mobile app and backend servers.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business intelligence data accessed via IBM Cognos Analytics Mobile on iOS devices. Organizations relying on this mobile application for accessing corporate analytics and reports could face data leakage risks if attackers intercept communications. This could lead to exposure of strategic business insights, financial data, or personally identifiable information (PII) depending on the nature of the reports accessed. The impact is heightened in sectors with strict data protection regulations such as finance, healthcare, and government, where unauthorized data disclosure can result in regulatory penalties under GDPR and damage to reputation. Additionally, the vulnerability could be exploited in targeted attacks against high-value European enterprises or government agencies using IBM Cognos Analytics Mobile, potentially facilitating espionage or competitive intelligence gathering. However, the medium severity and high attack complexity suggest that widespread exploitation is less likely without significant attacker resources or insider knowledge.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating IBM Cognos Analytics Mobile to a version where the AFNetworking library is properly configured or replaced with a secure alternative. Since no patch links are currently provided, organizations should monitor IBM security advisories for official updates or patches. In the interim, organizations can implement network-level protections such as enforcing VPN usage for mobile devices accessing corporate resources, deploying mobile device management (MDM) solutions to restrict app versions and enforce security policies, and using network traffic inspection tools to detect anomalous data manipulation. Additionally, organizations should review and strengthen transport layer security configurations, ensuring TLS versions and cipher suites meet current best practices. Educating users about the risks of using outdated app versions and restricting access to sensitive analytics data from mobile devices until remediation is applied can further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:16.298Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e8777a83201eaac127e72

Added to database: 7/21/2025, 6:31:19 PM

Last enriched: 7/21/2025, 6:46:09 PM

Last updated: 8/11/2025, 9:41:25 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats