CVE-2025-36106: CWE-326 Inadequate Encryption Strength in IBM Cognos Analytics Mobile
IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to view and modify information coming to and from the application which could then be used to access confidential information on the device or network by using a the deprecated or misconfigured AFNetworking library at runtime.
AI Analysis
Technical Summary
CVE-2025-36106 is a vulnerability identified in IBM Cognos Analytics Mobile for iOS versions 1.1.0 through 1.1.22. The issue stems from the use of a deprecated or misconfigured AFNetworking library at runtime, which results in inadequate encryption strength (classified under CWE-326). This weakness allows malicious actors to intercept and potentially modify data transmitted between the mobile application and backend services. Specifically, the vulnerability enables attackers to view and alter information in transit, which could lead to unauthorized access to confidential information stored on the device or accessible through the network. The vulnerability does not require user interaction or authentication, but it does have a high attack complexity, meaning that exploitation is not trivial and may require specific conditions or skills. The CVSS v3.1 base score is 6.5 (medium severity), reflecting a high impact on confidentiality, limited impact on integrity, and no impact on availability. The vulnerability affects the confidentiality of sensitive business intelligence data handled by IBM Cognos Analytics Mobile, potentially exposing sensitive corporate analytics and reports to unauthorized parties. Since the vulnerability is related to encryption strength and transport security, it primarily threatens data confidentiality during communication sessions between the mobile app and backend servers.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business intelligence data accessed via IBM Cognos Analytics Mobile on iOS devices. Organizations relying on this mobile application for accessing corporate analytics and reports could face data leakage risks if attackers intercept communications. This could lead to exposure of strategic business insights, financial data, or personally identifiable information (PII) depending on the nature of the reports accessed. The impact is heightened in sectors with strict data protection regulations such as finance, healthcare, and government, where unauthorized data disclosure can result in regulatory penalties under GDPR and damage to reputation. Additionally, the vulnerability could be exploited in targeted attacks against high-value European enterprises or government agencies using IBM Cognos Analytics Mobile, potentially facilitating espionage or competitive intelligence gathering. However, the medium severity and high attack complexity suggest that widespread exploitation is less likely without significant attacker resources or insider knowledge.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating IBM Cognos Analytics Mobile to a version where the AFNetworking library is properly configured or replaced with a secure alternative. Since no patch links are currently provided, organizations should monitor IBM security advisories for official updates or patches. In the interim, organizations can implement network-level protections such as enforcing VPN usage for mobile devices accessing corporate resources, deploying mobile device management (MDM) solutions to restrict app versions and enforce security policies, and using network traffic inspection tools to detect anomalous data manipulation. Additionally, organizations should review and strengthen transport layer security configurations, ensuring TLS versions and cipher suites meet current best practices. Educating users about the risks of using outdated app versions and restricting access to sensitive analytics data from mobile devices until remediation is applied can further reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-36106: CWE-326 Inadequate Encryption Strength in IBM Cognos Analytics Mobile
Description
IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to view and modify information coming to and from the application which could then be used to access confidential information on the device or network by using a the deprecated or misconfigured AFNetworking library at runtime.
AI-Powered Analysis
Technical Analysis
CVE-2025-36106 is a vulnerability identified in IBM Cognos Analytics Mobile for iOS versions 1.1.0 through 1.1.22. The issue stems from the use of a deprecated or misconfigured AFNetworking library at runtime, which results in inadequate encryption strength (classified under CWE-326). This weakness allows malicious actors to intercept and potentially modify data transmitted between the mobile application and backend services. Specifically, the vulnerability enables attackers to view and alter information in transit, which could lead to unauthorized access to confidential information stored on the device or accessible through the network. The vulnerability does not require user interaction or authentication, but it does have a high attack complexity, meaning that exploitation is not trivial and may require specific conditions or skills. The CVSS v3.1 base score is 6.5 (medium severity), reflecting a high impact on confidentiality, limited impact on integrity, and no impact on availability. The vulnerability affects the confidentiality of sensitive business intelligence data handled by IBM Cognos Analytics Mobile, potentially exposing sensitive corporate analytics and reports to unauthorized parties. Since the vulnerability is related to encryption strength and transport security, it primarily threatens data confidentiality during communication sessions between the mobile app and backend servers.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business intelligence data accessed via IBM Cognos Analytics Mobile on iOS devices. Organizations relying on this mobile application for accessing corporate analytics and reports could face data leakage risks if attackers intercept communications. This could lead to exposure of strategic business insights, financial data, or personally identifiable information (PII) depending on the nature of the reports accessed. The impact is heightened in sectors with strict data protection regulations such as finance, healthcare, and government, where unauthorized data disclosure can result in regulatory penalties under GDPR and damage to reputation. Additionally, the vulnerability could be exploited in targeted attacks against high-value European enterprises or government agencies using IBM Cognos Analytics Mobile, potentially facilitating espionage or competitive intelligence gathering. However, the medium severity and high attack complexity suggest that widespread exploitation is less likely without significant attacker resources or insider knowledge.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating IBM Cognos Analytics Mobile to a version where the AFNetworking library is properly configured or replaced with a secure alternative. Since no patch links are currently provided, organizations should monitor IBM security advisories for official updates or patches. In the interim, organizations can implement network-level protections such as enforcing VPN usage for mobile devices accessing corporate resources, deploying mobile device management (MDM) solutions to restrict app versions and enforce security policies, and using network traffic inspection tools to detect anomalous data manipulation. Additionally, organizations should review and strengthen transport layer security configurations, ensuring TLS versions and cipher suites meet current best practices. Educating users about the risks of using outdated app versions and restricting access to sensitive analytics data from mobile devices until remediation is applied can further reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:16.298Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687e8777a83201eaac127e72
Added to database: 7/21/2025, 6:31:19 PM
Last enriched: 7/21/2025, 6:46:09 PM
Last updated: 8/11/2025, 9:41:25 AM
Views: 21
Related Threats
CVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumCVE-2025-55710: CWE-201 Insertion of Sensitive Information Into Sent Data in Steve Burge TaxoPress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.