Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36144: CWE-532 Insertion of Sensitive Information into Log File in IBM watsonx.data

0
Low
VulnerabilityCVE-2025-36144cvecve-2025-36144cwe-532
Published: Sat Sep 27 2025 (09/27/2025, 00:05:08 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: watsonx.data

Description

IBM Lakehouse (watsonx.data 2.2) stores potentially sensitive information in log files that could be read by a local user.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:59:12 UTC

Technical Analysis

CVE-2025-36144 is a vulnerability identified in IBM watsonx.data version 2.2, part of the IBM Lakehouse platform. This vulnerability is classified under CWE-532, which involves the insertion of sensitive information into log files. Specifically, the product stores potentially sensitive data within its log files, which can be accessed by a local user on the system. The vulnerability arises because these logs are not properly sanitized or protected, allowing information that should remain confidential to be exposed through log file access. The CVSS v3.1 score for this vulnerability is 3.3, indicating a low severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) shows that the attack vector requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L) but no user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. There are no known exploits in the wild, and no patches have been linked yet. This vulnerability primarily affects confidentiality by potentially exposing sensitive information to unauthorized local users who have access to the system where watsonx.data 2.2 is installed. The lack of user interaction and low complexity means that an attacker with local access and low privileges could retrieve sensitive data from logs without needing to exploit more complex attack vectors or escalate privileges.

Potential Impact

For European organizations using IBM watsonx.data 2.2, this vulnerability poses a risk of sensitive data leakage through log files accessible to local users. While the severity is low, the exposure of sensitive information could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential insider threats. Organizations handling critical or regulated data (such as financial, healthcare, or personal data) could face reputational damage and legal consequences if sensitive information is disclosed. The impact is mitigated by the requirement for local access and low privileges, which limits remote exploitation. However, in environments where multiple users share systems or where local access controls are weak, the risk increases. Additionally, the vulnerability could be leveraged as part of a broader attack chain, where information gathered from logs aids in further exploitation or lateral movement within the network.

Mitigation Recommendations

European organizations should implement strict access controls on systems running IBM watsonx.data 2.2 to limit local user access only to trusted personnel. Log files should be stored with appropriate file permissions to prevent unauthorized reading. Organizations should audit and monitor log file contents regularly to detect any sensitive information leakage. Where possible, configure watsonx.data to minimize logging of sensitive data or enable log sanitization features if available. Employ host-based intrusion detection systems (HIDS) to alert on unusual access to log files. Additionally, organizations should stay updated with IBM advisories and apply patches or updates as soon as they become available. In the interim, consider isolating systems running vulnerable versions or deploying compensating controls such as encryption of log files at rest. Conduct regular security training to raise awareness about the risks of local access and data exposure through logs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d730e279aa5c9d085546ff

Added to database: 9/27/2025, 12:33:38 AM

Last enriched: 10/5/2025, 12:59:12 AM

Last updated: 11/9/2025, 7:38:07 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats