CVE-2025-36299

4.3 MEDIUM

📋 TL;DR

IBM Planning Analytics Local versions 2.1.0 through 2.1.14 store sensitive information in source code, potentially exposing credentials or configuration data. This information disclosure vulnerability could enable attackers to gather intelligence for further attacks against the system. Organizations running affected versions of IBM Planning Analytics Local are impacted.

💻 Affected Systems

Products:
  • IBM Planning Analytics Local
Versions: 2.1.0 through 2.1.14
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations of affected versions. Specific operating system requirements not detailed in the advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials or API keys from source code, leading to full system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Attackers discover configuration details or limited credentials that enable privilege escalation or facilitate other attack vectors against the Planning Analytics environment.

🟢

If Mitigated

With proper access controls and network segmentation, the exposed information provides limited value to attackers who cannot reach other system components.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to source code files, which typically requires some level of system access. The advisory doesn't specify if this requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.15 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7251265

Restart Required: Yes

Instructions:

1. Download IBM Planning Analytics Local version 2.1.15 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Install the updated version following IBM's installation guide. 4. Restart the Planning Analytics services.

🔧 Temporary Workarounds

Restrict Source Code Access

linux

Apply strict file system permissions to limit access to Planning Analytics source code directories

chmod 750 /path/to/planning-analytics-source
chown root:planninggroup /path/to/planning-analytics-source

Network Segmentation

all

Isolate Planning Analytics servers from untrusted networks and limit access to authorized users only

🧯 If You Can't Patch

  • Implement strict access controls to Planning Analytics source directories
  • Monitor for unusual access patterns to Planning Analytics files and directories

🔍 How to Verify

Check if Vulnerable:

Check IBM Planning Analytics Local version via administrative console or configuration files. Versions 2.1.0 through 2.1.14 are vulnerable.

Check Version:

Check the version in the Planning Analytics administrative console or review installation directory version files

Verify Fix Applied:

Verify installation of version 2.1.15 or later through the administrative interface or version configuration files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to Planning Analytics source directories
  • Multiple failed authentication attempts followed by source code access

Network Indicators:

  • Unexpected connections to Planning Analytics servers from unauthorized IP addresses

SIEM Query:

source="planning-analytics-logs" AND (event="file_access" AND path="*source*" AND user!="authorized_user")

🔗 References

📤 Share & Export