CVE-2025-33150

5.3 MEDIUM

📋 TL;DR

IBM Cognos Analytics Certified Containers 12.1.0 contains hidden pages that can expose package parameter information to unauthorized users. This information disclosure vulnerability affects organizations running vulnerable IBM Cognos Analytics Certified Containers deployments. Attackers could access sensitive configuration details that should remain protected.

💻 Affected Systems

Products:
  • IBM Cognos Analytics Certified Containers
Versions: 12.1.0
Operating Systems: Container-based deployments
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects IBM Cognos Analytics Certified Containers deployment model

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive package parameters that could reveal system configuration details, potentially enabling further attacks or exposing business intelligence data structures.

🟠

Likely Case

Unauthorized users access hidden pages containing package parameter information, leading to information disclosure about system configuration and potentially aiding reconnaissance for other attacks.

🟢

If Mitigated

With proper access controls and network segmentation, the impact is limited to internal information disclosure with minimal operational disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves accessing hidden pages that should not be publicly accessible

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as per IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7250395

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL
2. Apply IBM-recommended fixes for Cognos Analytics Certified Containers
3. Restart affected containers
4. Verify the hidden pages are no longer accessible

🔧 Temporary Workarounds

Access Control Restriction

all

Implement strict access controls to limit who can access the Cognos Analytics containers

Network Segmentation

all

Isolate Cognos Analytics containers from untrusted networks and implement firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit container exposure
  • Monitor access logs for attempts to access hidden pages or unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Cognos Analytics Certified Containers 12.1.0 and attempt to access hidden pages as described in the advisory

Check Version:

Check container version through IBM Cognos Analytics administration interface or container inspection commands

Verify Fix Applied:

After applying IBM's fix, verify that hidden pages containing package parameter information are no longer accessible

📡 Detection & Monitoring

Log Indicators:

  • Access attempts to hidden pages or unusual URLs
  • Requests for package parameter information from unauthorized sources

Network Indicators:

  • Unusual HTTP requests to Cognos Analytics container endpoints
  • Traffic patterns indicating reconnaissance of hidden pages

SIEM Query:

source="cognos-logs" AND (url CONTAINS "hidden" OR url CONTAINS "parameter" OR status=200 AND url NOT IN allowed_urls)

🔗 References

📤 Share & Export