CVE-2025-36361 (GCVE-0-2025-36361)

Vulnerability from cvelistv5 – Published: 2025-10-24 09:35 – Updated: 2025-10-25 02:03
VLAI?
Summary
IBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.
CWE
Assigner
ibm
References
Impacted products
Vendor Product Version
IBM App Connect Enterprise Affected: 13.0.1.0 , ≤ 13.0.4.2 (semver)
Affected: 12.0.1.0 , ≤ 12.0.12.17 (semver)
    cpe:2.3:a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:app_connect_enterprise:13.0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:app_connect_enterprise:13.0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:app_connect_enterprise:12.0.12.17:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36361",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-24T13:19:00.627097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-24T13:19:22.209Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:app_connect_enterprise:13.0.1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:app_connect_enterprise:13.0.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:app_connect_enterprise:12.0.12.17:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "App Connect Enterprise",
          "vendor": "IBM",
          "versions": [
            {
              "lessThanOrEqual": "13.0.4.2",
              "status": "affected",
              "version": "13.0.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "12.0.12.17",
              "status": "affected",
              "version": "12.0.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.\u003c/p\u003e"
            }
          ],
          "value": "IBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862 Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-25T02:03:18.631Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory",
            "patch"
          ],
          "url": "https://www.ibm.com/support/pages/node/7249061"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eRemediation/Fixes Affected Product(s) Versions(s) APAR Remediation / Fixes IBM App Connect Enterprise 13.0.1.0 - 13.0.4.2 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v13- Fix Pack Release 13.0.5.0 IBM App Connect Enterprise 12.0.1.0 - 12.0.12.17 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v12- Fix Pack Release 12.0.12.18\u003c/p\u003e"
            }
          ],
          "value": "Remediation/Fixes Affected Product(s) Versions(s) APAR Remediation / Fixes IBM App Connect Enterprise 13.0.1.0 - 13.0.4.2 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v13- Fix Pack Release 13.0.5.0 IBM App Connect Enterprise 12.0.1.0 - 12.0.12.17 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v12- Fix Pack Release 12.0.12.18"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "IBM App Connect Enterprise runtime is vulnerable to a lack of authorization on windows environments using IWA",
      "x_generator": {
        "engine": "ibm-cvegen"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2025-36361",
    "datePublished": "2025-10-24T09:35:20.590Z",
    "dateReserved": "2025-04-15T21:16:55.331Z",
    "dateUpdated": "2025-10-25T02:03:18.631Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-36361\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-10-24T10:15:38.670\",\"lastModified\":\"2025-10-28T14:27:33.283\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.\"},{\"lang\":\"es\",\"value\":\"IBM App Connect Enterprise 13.0.1.0 hasta 13.0.4.2, y 12.0.1.0 hasta 12.0.12.17 podr\u00eda permitir a un usuario autenticado realizar acciones no autorizadas en recursos definidos por el cliente debido a la falta de autorizaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.1.0\",\"versionEndIncluding\":\"12.0.12.17\",\"matchCriteriaId\":\"BAC9FE1D-8E0A-40ED-9BD9-0FF34EFA6093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1.0\",\"versionEndIncluding\":\"13.0.4.2\",\"matchCriteriaId\":\"1833099C-F96F-42B2-977C-A08DA426837D\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7249061\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-36361\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-24T13:19:00.627097Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-24T13:19:12.854Z\"}}], \"cna\": {\"title\": \"IBM App Connect Enterprise runtime is vulnerable to a lack of authorization on windows environments using IWA\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:app_connect_enterprise:13.0.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:app_connect_enterprise:13.0.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:app_connect_enterprise:12.0.12.17:*:*:*:*:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"App Connect Enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.0.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"13.0.4.2\"}, {\"status\": \"affected\", \"version\": \"12.0.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"12.0.12.17\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Remediation/Fixes Affected Product(s) Versions(s) APAR Remediation / Fixes IBM App Connect Enterprise 13.0.1.0 - 13.0.4.2 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v13- Fix Pack Release 13.0.5.0 IBM App Connect Enterprise 12.0.1.0 - 12.0.12.17 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v12- Fix Pack Release 12.0.12.18\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eRemediation/Fixes Affected Product(s) Versions(s) APAR Remediation / Fixes IBM App Connect Enterprise 13.0.1.0 - 13.0.4.2 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v13- Fix Pack Release 13.0.5.0 IBM App Connect Enterprise 12.0.1.0 - 12.0.12.17 IT48403 The APAR (IT48403) is available from IBM App Connect Enterprise v12- Fix Pack Release 12.0.12.18\u003c/p\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7249061\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"ibm-cvegen\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862 Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-10-25T02:03:18.631Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-36361\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-25T02:03:18.631Z\", \"dateReserved\": \"2025-04-15T21:16:55.331Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-10-24T09:35:20.590Z\", \"assignerShortName\": \"ibm\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…