CVE-2025-0823

6.5 MEDIUM

📋 TL;DR

This directory traversal vulnerability in IBM Cognos Analytics allows remote attackers to read arbitrary files on the server by sending specially crafted URL requests containing '../' sequences. Affected organizations are those running IBM Cognos Analytics versions 11.2.0-11.2.4 FP5 or 12.0.0-12.0.4 without proper security controls.

💻 Affected Systems

Products:
  • IBM Cognos Analytics
Versions: 11.2.0 through 11.2.4 FP5 and 12.0.0 through 12.0.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless specifically patched or workarounds applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or credential files, potentially leading to complete system compromise and data exfiltration.

🟠

Likely Case

Attackers would read configuration files, log files, or other sensitive data that could be used for further attacks or information gathering.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to reading non-sensitive files within the application's accessible directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal attacks are well-understood and easy to automate. The vulnerability requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Cognos Analytics 11.2.4 FP6 or 12.0.4 FP1

Vendor Advisory: https://www.ibm.com/support/pages/node/7183676

Restart Required: Yes

Instructions:

1. Download the fix pack from IBM Fix Central. 2. Apply the fix pack following IBM's installation instructions. 3. Restart the Cognos Analytics service. 4. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Configure WAF to block requests containing directory traversal sequences like '../' or URL-encoded equivalents.

Network Segmentation

all

Restrict access to Cognos Analytics servers to only trusted networks and users.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which IP addresses can reach the Cognos Analytics server.
  • Deploy a web application firewall with rules specifically blocking directory traversal patterns in URLs.

🔍 How to Verify

Check if Vulnerable:

Check if your IBM Cognos Analytics version falls within the affected ranges: 11.2.0-11.2.4 FP5 or 12.0.0-12.0.4.

Check Version:

Check the version in the Cognos Administration console under 'About' or examine the installation directory for version files.

Verify Fix Applied:

Verify the installed version is 11.2.4 FP6 or higher, or 12.0.4 FP1 or higher.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences in URLs
  • Multiple failed attempts to access files outside expected directories
  • Unusual file access patterns from single IP addresses

Network Indicators:

  • HTTP requests with encoded traversal sequences (%2e%2e%2f)
  • Bursts of requests to non-standard file paths

SIEM Query:

source="cognos_access.log" AND (url="*../*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export