CVE-2025-36058

5.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Business Automation Workflow containers allows attackers to access sensitive configuration information stored in config maps. It affects IBM Cloud Pak for Business Automation and IBM Business Automation Workflow containers running vulnerable versions. The exposure could include credentials, API keys, or other sensitive operational data.

💻 Affected Systems

Products:
  • IBM Business Automation Workflow
  • IBM Cloud Pak for Business Automation
Versions: 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, 24.0.0 through 24.0.0 Interim Fix 006
Operating Systems: Linux (containerized deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects containerized deployments; traditional installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, database passwords, or encryption keys leading to complete system compromise, data exfiltration, or lateral movement within the environment.

🟠

Likely Case

Attackers gain access to configuration secrets that could be used for privilege escalation, further reconnaissance, or targeted attacks against connected systems.

🟢

If Mitigated

Limited exposure of non-critical configuration data with minimal impact on overall system security.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation likely involves accessing exposed config map endpoints or improperly secured configuration data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Business Automation Workflow 25.0.0 Interim Fix 003, 24.0.1 Interim Fix 006, or 24.0.0 Interim Fix 007

Vendor Advisory: https://www.ibm.com/support/pages/node/7256777

Restart Required: Yes

Instructions:

1. Download the appropriate interim fix from IBM Fix Central. 2. Apply the fix following IBM's container update procedures. 3. Restart affected containers. 4. Verify the fix by checking container versions and testing config map access.

🔧 Temporary Workarounds

Restrict Config Map Access

linux

Implement Kubernetes RBAC to restrict access to config maps containing sensitive data.

kubectl create role configmap-reader --verb=get,list --resource=configmaps
kubectl create rolebinding restrict-configmaps --role=configmap-reader --user=system:anonymous

Network Segmentation

linux

Isolate vulnerable containers from untrusted networks using network policies.

kubectl apply -f network-policy.yaml

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable containers from untrusted networks.
  • Monitor and audit all access to config map resources for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check container version using kubectl get pods -o yaml | grep image and compare against affected versions.

Check Version:

kubectl get pods -o yaml | grep -A2 -B2 'image:'

Verify Fix Applied:

Verify container version is updated to patched versions and test config map access from unauthorized contexts.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to config map endpoints
  • Unusual API calls to Kubernetes config map resources

Network Indicators:

  • Unexpected traffic to config map API endpoints from unauthorized sources

SIEM Query:

source="kubernetes" AND (resource="configmaps" OR api_call="get configmap") AND user="system:anonymous"

🔗 References

📤 Share & Export