Skip to main content

CVE-2025-36107: CWE-319 Cleartext Transmission of Sensitive Information in IBM Cognos Analytics Mobile

Medium
VulnerabilityCVE-2025-36107cvecve-2025-36107cwe-319
Published: Mon Jul 21 2025 (07/21/2025, 18:07:13 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics Mobile

Description

IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to obtain sensitive information due to the cleartext transmission of data.

AI-Powered Analysis

AILast updated: 07/21/2025, 18:31:24 UTC

Technical Analysis

CVE-2025-36107 is a medium-severity vulnerability affecting IBM Cognos Analytics Mobile for iOS versions 1.1.0 through 1.1.22. The vulnerability arises from the cleartext transmission of sensitive information, classified under CWE-319 (Cleartext Transmission of Sensitive Information). This means that data exchanged between the mobile application and backend services is not adequately protected by encryption protocols such as TLS/SSL, allowing malicious actors with network access to intercept and capture sensitive data in transit. The vulnerability does not require authentication or user interaction, and the attack vector is network-based (AV:N). However, the attack complexity is high (AC:H), indicating that exploitation requires specific conditions or capabilities, such as proximity to the network or advanced interception techniques. The CVSS v3.1 base score is 5.9, reflecting a medium impact primarily on confidentiality (C:H), with no impact on integrity or availability. IBM Cognos Analytics Mobile is a business intelligence tool used to access and analyze corporate data on mobile devices, making the confidentiality of transmitted data critical. The lack of encryption could expose sensitive business intelligence reports, user credentials, or other proprietary information to eavesdropping, especially on unsecured or public Wi-Fi networks. No known exploits are currently reported in the wild, and no patches are listed yet, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive corporate data accessed via IBM Cognos Analytics Mobile on iOS devices. Many European enterprises rely on IBM Cognos for business intelligence and decision-making processes, often handling personal data protected under GDPR and other regulations. Interception of unencrypted data could lead to unauthorized disclosure of personal data, trade secrets, or strategic business information. This could result in regulatory penalties, reputational damage, and competitive disadvantage. The risk is heightened in environments where employees use mobile devices on public or unsecured networks, such as during travel or remote work. Although the vulnerability does not affect data integrity or availability, the exposure of confidential information alone can have severe consequences for compliance and trust. The medium severity score suggests that while exploitation is not trivial, the potential impact on confidentiality is substantial enough to warrant prompt attention.

Mitigation Recommendations

European organizations using IBM Cognos Analytics Mobile should implement the following specific mitigations: 1) Immediately audit and restrict the use of affected versions (1.1.0 through 1.1.22) on iOS devices, encouraging users to avoid these versions until a patch is available. 2) Enforce the use of secure network connections such as VPNs or trusted corporate Wi-Fi with strong encryption to reduce the risk of interception. 3) Monitor network traffic for signs of unencrypted data transmissions from mobile devices accessing Cognos Analytics. 4) Implement mobile device management (MDM) policies that can enforce application updates and restrict installation of vulnerable app versions. 5) Educate users about the risks of using the application on public or unsecured networks and encourage the use of secure communication channels. 6) Coordinate with IBM for timely patch deployment once available and verify that the patch enforces proper encryption of data in transit. 7) Consider additional application-layer encryption or data masking for highly sensitive reports accessed via mobile devices as an interim control.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:16.298Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e83e6a83201eaac1260fc

Added to database: 7/21/2025, 6:16:06 PM

Last enriched: 7/21/2025, 6:31:24 PM

Last updated: 7/21/2025, 6:31:24 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats