Skip to main content

CVE-2025-36133: CWE-532 Insertion of Sensitive Information into Log File in IBM App Connect Enterprise Certified Container

Medium
VulnerabilityCVE-2025-36133cvecve-2025-36133cwe-532
Published: Mon Sep 01 2025 (09/01/2025, 11:56:19 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: App Connect Enterprise Certified Container

Description

IBM App Connect Enterprise Certified Container CD: 9.2.0 through 11.6.0, 12.1.0 through 12.14.0, and 12.0 LTS: 12.0.0 through 12.0.14stores potentially sensitive information in log files during installation that could be read by a local user on the container.

AI-Powered Analysis

AILast updated: 09/01/2025, 12:17:46 UTC

Technical Analysis

CVE-2025-36133 is a medium-severity vulnerability affecting IBM App Connect Enterprise Certified Container versions 9.2.0 through 11.6.0, 12.1.0 through 12.14.0, and 12.0 LTS versions 12.0.0 through 12.0.14. The vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files. Specifically, during the installation process of the affected IBM App Connect Enterprise Certified Container versions, potentially sensitive data is written into log files. These log files reside within the container environment and can be accessed by a local user with access to the container. The sensitive information exposure does not require user interaction or privileges but does require local access to the container environment, which limits the attack vector to those with container-level access. The CVSS v3.1 base score is 5.9, indicating a medium severity, with the vector AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N. This means the attack requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and the scope is changed (S:C). The impact is high on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). No known exploits are currently in the wild, and no patches are linked yet. The vulnerability could allow an attacker with local container access to read sensitive information such as credentials or configuration secrets stored in logs, potentially leading to further compromise if leveraged properly.

Potential Impact

For European organizations using IBM App Connect Enterprise Certified Containers, this vulnerability poses a confidentiality risk. If an attacker gains local access to the container environment—through compromised credentials, insider threat, or lateral movement—they could extract sensitive information from installation logs. This could include secrets, tokens, or configuration details that facilitate further attacks, such as privilege escalation or lateral movement within the network. Given the widespread use of IBM App Connect in enterprise integration scenarios, exposure of sensitive data could disrupt business processes, lead to data breaches, or violate data protection regulations like GDPR. The impact is particularly significant for organizations handling sensitive or regulated data, as unauthorized disclosure could result in compliance violations and reputational damage. However, the requirement for local access and high attack complexity reduces the likelihood of remote exploitation, limiting the threat primarily to environments where container access controls are weak or compromised.

Mitigation Recommendations

To mitigate CVE-2025-36133, European organizations should implement the following specific measures: 1) Restrict and tightly control access to container environments running IBM App Connect Enterprise, ensuring only authorized personnel have local access. 2) Monitor and audit container access logs to detect any unauthorized or suspicious local access attempts. 3) Employ container security best practices such as running containers with least privilege, using read-only file systems where possible, and isolating containers to minimize lateral movement. 4) Review and sanitize log files generated during installation to remove or mask sensitive information, or configure logging to exclude sensitive data if supported. 5) Stay alert for IBM security advisories and apply patches or updates promptly once available. 6) Use secrets management solutions external to the container to avoid embedding sensitive information in installation processes or logs. 7) Conduct regular security assessments of container configurations and deployment pipelines to identify and remediate potential information leakage vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.007Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b58b60ad5a09ad00cea898

Added to database: 9/1/2025, 12:02:40 PM

Last enriched: 9/1/2025, 12:17:46 PM

Last updated: 9/4/2025, 12:34:40 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats