Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36437: CWE-209 Generation of Error Message Containing Sensitive Information in IBM IBM Planning Analytics Local

0
Medium
VulnerabilityCVE-2025-36437cvecve-2025-36437cwe-209
Published: Tue Dec 09 2025 (12/09/2025, 22:04:14 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM Planning Analytics Local

Description

IBM Planning Analytics Local 2.1.0 - 2.1.15 could disclose sensitive information about server architecture that could aid in further attacks against the system.

AI-Powered Analysis

AILast updated: 12/09/2025, 22:31:14 UTC

Technical Analysis

CVE-2025-36437 is a vulnerability classified under CWE-209, which pertains to the generation of error messages containing sensitive information. This issue affects IBM Planning Analytics Local versions 2.1.0 through 2.1.15. The vulnerability arises because the software discloses details about the server architecture in its error messages. Such information disclosure can provide attackers with valuable insights into the system’s configuration, potentially facilitating more sophisticated attacks such as targeted exploitation of other vulnerabilities or reconnaissance for lateral movement. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality only (C:L), with no impact on integrity or availability. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in April 2025 and published in December 2025. IBM Planning Analytics Local is a financial and operational planning software widely used in enterprise environments, making this vulnerability relevant to organizations relying on this product for critical business functions.

Potential Impact

For European organizations, the disclosure of sensitive server architecture information could increase the risk of targeted attacks against their IBM Planning Analytics Local deployments. Attackers could leverage this information to identify additional vulnerabilities or misconfigurations, potentially leading to unauthorized access or data breaches. Although the vulnerability itself does not directly compromise data integrity or availability, the confidentiality leak can be a stepping stone for more severe attacks. Organizations in finance, manufacturing, and government sectors that use IBM Planning Analytics Local for critical planning and analytics functions may face increased risk. The medium severity rating suggests that while immediate exploitation impact is limited, the vulnerability should be addressed promptly to prevent escalation. Additionally, compliance with European data protection regulations such as GDPR may be impacted if sensitive information is exposed or if subsequent attacks lead to data breaches.

Mitigation Recommendations

1. Restrict network access to IBM Planning Analytics Local instances by implementing strict firewall rules and network segmentation to limit exposure to trusted users and systems only. 2. Monitor application and system logs for unusual error messages or access patterns that could indicate reconnaissance or exploitation attempts. 3. Apply any available patches or updates from IBM as soon as they are released to address this vulnerability. 4. If patches are not yet available, consider implementing custom error handling or suppressing detailed error messages to prevent sensitive information leakage. 5. Conduct regular security assessments and penetration testing focused on IBM Planning Analytics Local deployments to identify and remediate related weaknesses. 6. Educate system administrators and users about the risks of information disclosure and the importance of reporting suspicious activity. 7. Review and harden server configurations to minimize information exposure through error messages or other system outputs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:17:03.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69389fb7d4eb7e5ad77c2812

Added to database: 12/9/2025, 10:16:23 PM

Last enriched: 12/9/2025, 10:31:14 PM

Last updated: 12/11/2025, 7:35:08 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats