CVE-2025-36437

4.3 MEDIUM

📋 TL;DR

This vulnerability in IBM Planning Analytics Local versions 2.1.0 through 2.1.15 allows attackers to obtain sensitive information about server architecture. This information disclosure could help attackers plan more sophisticated follow-up attacks. Organizations running affected versions of IBM Planning Analytics Local are impacted.

💻 Affected Systems

Products:
  • IBM Planning Analytics Local
Versions: 2.1.0 - 2.1.15
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable unless specifically patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain detailed server architecture information that enables them to craft targeted attacks leading to full system compromise.

🟠

Likely Case

Attackers gather reconnaissance data about server configuration, software versions, and architecture to inform subsequent attack attempts.

🟢

If Mitigated

Limited information disclosure with no direct system access, though architectural details could still aid attackers.

🌐 Internet-Facing: MEDIUM - Information disclosure vulnerabilities on internet-facing systems provide attackers with reconnaissance data for planning attacks.
🏢 Internal Only: LOW - Internal systems have reduced exposure, though lateral movement within networks could still leverage this information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Information disclosure vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.16 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7253603

Restart Required: Yes

Instructions:

1. Download IBM Planning Analytics Local version 2.1.16 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Install the updated version following IBM's installation guide. 4. Restart the Planning Analytics services.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Planning Analytics servers to only trusted IP addresses and networks.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [Planning Analytics Port] -s [Trusted IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [Planning Analytics Port] -j DROP

Application Layer Filtering

all

Implement web application firewall rules to block requests that attempt to access sensitive information endpoints.

Configure WAF rules to detect and block reconnaissance patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Planning Analytics servers from untrusted networks
  • Deploy intrusion detection systems to monitor for reconnaissance attempts and information disclosure patterns

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Planning Analytics Local via the administration console or by examining installation directories for version files.

Check Version:

Check the version.txt file in the installation directory or use the administrative interface to view version information.

Verify Fix Applied:

Verify the version number shows 2.1.16 or higher in the administration interface or version files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to information disclosure endpoints
  • Multiple failed authentication attempts followed by information gathering requests
  • Requests from unexpected IP addresses to administrative interfaces

Network Indicators:

  • Unusual traffic patterns to Planning Analytics servers from external sources
  • Repeated requests to known information disclosure endpoints

SIEM Query:

source="PlanningAnalytics" AND (event_type="information_disclosure" OR uri CONTAINS "/sensitive/" OR status_code=200 AND response_size>threshold)

🔗 References

📤 Share & Export