CVE-2025-36017
📋 TL;DR
IBM Controller and Cognos Controller versions store sensitive information unencrypted in environmental variables files, allowing authenticated users to access credentials or other confidential data. This affects organizations running vulnerable versions of these IBM financial consolidation and reporting products.
💻 Affected Systems
- IBM Controller
- IBM Cognos Controller
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could extract credentials, database connection strings, or other sensitive configuration data, leading to full system compromise, data exfiltration, or lateral movement within the network.
Likely Case
Authenticated users with legitimate access could inadvertently or intentionally view sensitive configuration details stored in environmental variables, potentially exposing credentials or system information.
If Mitigated
With proper access controls and monitoring, the risk is limited to authorized users who would already have some level of system access.
🎯 Exploit Status
Exploitation requires authenticated access to the system. The vulnerability involves reading environmental variables files that contain unencrypted sensitive information.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: IBM Controller 11.1.2; IBM Cognos Controller 11.0.2
Vendor Advisory: https://www.ibm.com/support/pages/node/7253283
Restart Required: Yes
Instructions:
1. Download the latest version from IBM Fix Central. 2. Apply the fix following IBM's installation instructions. 3. Restart the Controller services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Restrict File Access Permissions
allLimit read access to environmental variables files to only necessary system accounts and administrators.
chmod 600 /path/to/environment/files (Linux)
icacls "C:\path\to\environment\files" /inheritance:r /grant:r "Administrators:F" (Windows)
Audit and Remove Sensitive Data
allReview environmental variables files and remove or encrypt any sensitive information stored in plain text.
grep -r "PASSWORD\|SECRET\|KEY" /path/to/environment/files (Linux)
findstr /i "PASSWORD SECRET KEY" C:\path\to\environment\files\*.* (Windows)
🧯 If You Can't Patch
- Implement strict access controls to limit who can read environmental variables files
- Monitor access to environmental variables files and alert on unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check the version of IBM Controller or Cognos Controller installed. If within affected ranges, examine environmental variables files for unencrypted sensitive information.
Check Version:
Check the product version in the application interface or installation directory properties.
Verify Fix Applied:
Verify the installed version is 11.1.2 or higher for IBM Controller, or 11.0.2 or higher for IBM Cognos Controller. Confirm environmental variables no longer contain unencrypted sensitive data.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to environmental variables files
- Failed attempts to access restricted system files
Network Indicators:
- Unexpected outbound connections following file access
SIEM Query:
source="*controller*" AND (event="File Access" OR event="Permission Change") AND file_path="*environment*"