CVE-2025-36146: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM watsonx.data
IBM Lakehouse (watsonx.data 2.2) could allow an authenticated user to obtain sensitive server component version information which could aid in further attacks against the system.
AI Analysis
Technical Summary
CVE-2025-36146 is a medium-severity vulnerability identified in IBM watsonx.data version 2.2, part of the IBM Lakehouse platform. The vulnerability is categorized under CWE-497, which involves the exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows an authenticated user with legitimate access privileges to retrieve sensitive server component version information. Although the vulnerability does not permit direct unauthorized access or modification of data, the disclosure of detailed versioning information can facilitate further targeted attacks by providing attackers with insights into the software environment, including potential unpatched components or known weaknesses. The CVSS 3.1 score of 4.3 reflects a low complexity attack vector (network), requiring low privileges (authenticated user), no user interaction, and impacting confidentiality to a limited extent without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes in the near future.
Potential Impact
For European organizations, the exposure of sensitive system information in IBM watsonx.data can increase the risk profile by enabling attackers to craft more effective attacks, such as targeted exploits or social engineering campaigns. Organizations using watsonx.data for data analytics and lakehouse management could face increased reconnaissance activities that precede more severe attacks. While the immediate impact on confidentiality, integrity, and availability is limited, the vulnerability can serve as an enabler for attackers to identify exploitable weaknesses in the environment. This is particularly critical for sectors handling sensitive or regulated data, such as finance, healthcare, and government institutions within Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notifications. The vulnerability may also affect trust in cloud and hybrid data platforms, potentially disrupting business operations if exploited in chained attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict access to IBM watsonx.data instances to only necessary authenticated users, employing the principle of least privilege to minimize exposure. 2) Monitor and audit access logs for unusual or unauthorized attempts to query system information. 3) Apply network segmentation and firewall rules to limit exposure of the watsonx.data management interfaces to trusted networks only. 4) Engage with IBM support channels to obtain patches or updates addressing CVE-2025-36146 as they become available and prioritize timely deployment. 5) Implement compensating controls such as masking or filtering version information in responses if configurable. 6) Conduct regular vulnerability assessments and penetration testing focusing on information disclosure vectors. 7) Educate administrators and users about the risks of information leakage and encourage reporting of suspicious activities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-36146: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM watsonx.data
Description
IBM Lakehouse (watsonx.data 2.2) could allow an authenticated user to obtain sensitive server component version information which could aid in further attacks against the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-36146 is a medium-severity vulnerability identified in IBM watsonx.data version 2.2, part of the IBM Lakehouse platform. The vulnerability is categorized under CWE-497, which involves the exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows an authenticated user with legitimate access privileges to retrieve sensitive server component version information. Although the vulnerability does not permit direct unauthorized access or modification of data, the disclosure of detailed versioning information can facilitate further targeted attacks by providing attackers with insights into the software environment, including potential unpatched components or known weaknesses. The CVSS 3.1 score of 4.3 reflects a low complexity attack vector (network), requiring low privileges (authenticated user), no user interaction, and impacting confidentiality to a limited extent without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes in the near future.
Potential Impact
For European organizations, the exposure of sensitive system information in IBM watsonx.data can increase the risk profile by enabling attackers to craft more effective attacks, such as targeted exploits or social engineering campaigns. Organizations using watsonx.data for data analytics and lakehouse management could face increased reconnaissance activities that precede more severe attacks. While the immediate impact on confidentiality, integrity, and availability is limited, the vulnerability can serve as an enabler for attackers to identify exploitable weaknesses in the environment. This is particularly critical for sectors handling sensitive or regulated data, such as finance, healthcare, and government institutions within Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notifications. The vulnerability may also affect trust in cloud and hybrid data platforms, potentially disrupting business operations if exploited in chained attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict access to IBM watsonx.data instances to only necessary authenticated users, employing the principle of least privilege to minimize exposure. 2) Monitor and audit access logs for unusual or unauthorized attempts to query system information. 3) Apply network segmentation and firewall rules to limit exposure of the watsonx.data management interfaces to trusted networks only. 4) Engage with IBM support channels to obtain patches or updates addressing CVE-2025-36146 as they become available and prioritize timely deployment. 5) Implement compensating controls such as masking or filtering version information in responses if configurable. 6) Conduct regular vulnerability assessments and penetration testing focusing on information disclosure vectors. 7) Educate administrators and users about the risks of information leakage and encourage reporting of suspicious activities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:19.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cc237367c782851fe3185a
Added to database: 9/18/2025, 3:21:23 PM
Last enriched: 9/18/2025, 3:22:02 PM
Last updated: 9/18/2025, 7:03:29 PM
Views: 5
Related Threats
CVE-2025-54754: CWE-259 in Cognex In-Sight 2000 series
HighCVE-2025-53947: CWE-276 in Cognex In-Sight 2000 series
HighCVE-2025-47698: CWE-319 in Cognex In-Sight 2000 series
HighCVE-2025-30519: CWE-1391 in Dover Fueling Solutions ProGauge MagLink LX 4
CriticalCVE-2025-47906: CWE-115: Misinterpretation of Input in Go standard library os/exec
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.