CVE-2025-36180: CWE-923 Improper Restriction of Communication Channel to Intended Endpoints in IBM watsonx.data
IBM watsonx.data 2.2 through 2.3 IBM Lakehouse does not properly restrict communication between pods which could allow an attacker to transfer data between pods without restrictions.
AI Analysis
Technical Summary
CVE-2025-36180 affects IBM watsonx.data versions 2.2 through 2.3, specifically the IBM Lakehouse component. The vulnerability arises from improper restriction of communication channels between pods, potentially allowing unauthorized data transfer between pods. This is classified under CWE-923. The CVSS v3.1 base score is 5.3, with attack vector as adjacent network, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact.
Potential Impact
The vulnerability could allow an attacker to transfer data between pods without restrictions, potentially compromising data integrity within the affected environment. There is no confidentiality or availability impact indicated. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or temporary mitigation has been published by IBM, users should monitor IBM advisories for updates. Until a fix is available, consider restricting pod communication through network policies or other controls as a precautionary measure.
CVE-2025-36180: CWE-923 Improper Restriction of Communication Channel to Intended Endpoints in IBM watsonx.data
Description
IBM watsonx.data 2.2 through 2.3 IBM Lakehouse does not properly restrict communication between pods which could allow an attacker to transfer data between pods without restrictions.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36180 affects IBM watsonx.data versions 2.2 through 2.3, specifically the IBM Lakehouse component. The vulnerability arises from improper restriction of communication channels between pods, potentially allowing unauthorized data transfer between pods. This is classified under CWE-923. The CVSS v3.1 base score is 5.3, with attack vector as adjacent network, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact.
Potential Impact
The vulnerability could allow an attacker to transfer data between pods without restrictions, potentially compromising data integrity within the affected environment. There is no confidentiality or availability impact indicated. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or temporary mitigation has been published by IBM, users should monitor IBM advisories for updates. Until a fix is available, consider restricting pod communication through network policies or other controls as a precautionary measure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:23.419Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f3cb59cbff5d86108f882e
Added to database: 4/30/2026, 9:36:25 PM
Last enriched: 4/30/2026, 9:52:18 PM
Last updated: 5/1/2026, 1:10:28 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.