CVE-2025-1333 (GCVE-0-2025-1333)
Vulnerability from cvelistv5 – Published: 2025-05-01 22:07 – Updated: 2025-08-28 15:00
VLAI?
Summary
IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.
Severity ?
6 (Medium)
CWE
- CWE-214 - Invocation of Process Using Visible Sensitive Information
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | MQ Operator |
Affected:
2.0.0 LTS , ≤ 2.0.29 LTS
(semver)
Affected: 3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1 CD Affected: 3.2.0 SC2 , ≤ 3.2.10 SC2 (semver) cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:* cpe:2.3:a:ibm:mq_operator:3.2.10:*:*:*:support_cycle_2:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1333",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-02T14:36:23.026891Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-02T14:36:30.042Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.2.10:*:*:*:support_cycle_2:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MQ Operator",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "2.0.29 LTS",
"status": "affected",
"version": "2.0.0 LTS",
"versionType": "semver"
},
{
"status": "affected",
"version": "3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1 CD"
},
{
"lessThanOrEqual": "3.2.10 SC2",
"status": "affected",
"version": "3.2.0 SC2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.\u003cbr\u003e"
}
],
"value": "IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-214",
"description": "CWE-214 Invocation of Process Using Visible Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T15:00:22.174Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7232272"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Issues mentioned by this security bulletin are addressed in\u0026nbsp;\u003cbr\u003eIBM MQ Operator v3.5.2 CD release that included IBM supplied MQ Advanced 9.4.2.1-r1 container image. \u003cbr\u003eIBM MQ Operator v3.2.11 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r1 container image.\u003cbr\u003eIBM MQ Container 9.4.2.1-r1 release.\u003cbr\u003eIBM strongly recommends applying the latest container images."
}
],
"value": "Issues mentioned by this security bulletin are addressed in\u00a0\nIBM MQ Operator v3.5.2 CD release that included IBM supplied MQ Advanced 9.4.2.1-r1 container image. \nIBM MQ Operator v3.2.11 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r1 container image.\nIBM MQ Container 9.4.2.1-r1 release.\nIBM strongly recommends applying the latest container images."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM MQ Operator information disclosure",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-1333",
"datePublished": "2025-05-01T22:07:08.697Z",
"dateReserved": "2025-02-15T13:46:56.478Z",
"dateUpdated": "2025-08-28T15:00:22.174Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-1333\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-05-01T22:15:16.657\",\"lastModified\":\"2025-08-25T17:27:30.640\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.\"},{\"lang\":\"es\",\"value\":\"IBM MQ Container cuando se utiliza con IBM MQ Operator LTS 2.0.0 a 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 a 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 y MQ Operator SC2 3.2.0 a 3.2.10 y se configura con Cloud Pak for Integration Keycloak podr\u00eda divulgar informaci\u00f3n confidencial a un usuario privilegiado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-214\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.0.29\",\"matchCriteriaId\":\"F7AFB54D-40A4-4F84-AFFF-CB281A60B4FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndIncluding\":\"2.2.2\",\"matchCriteriaId\":\"976E62F2-8B84-48A7-B4EF-0F0E3100BCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndIncluding\":\"2.3.3\",\"matchCriteriaId\":\"A899D4D9-04D0-404E-95BA-BFA1874B1188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.8\",\"matchCriteriaId\":\"F3142CD8-16DC-4298-A545-4BEDEBB3A20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:cd:*:*:*\",\"versionStartIncluding\":\"3.1.0\",\"versionEndIncluding\":\"3.1.3\",\"matchCriteriaId\":\"E76199DF-C063-498D-99B1-61FCAF92BA28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:sc2:*:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndIncluding\":\"3.2.10\",\"matchCriteriaId\":\"B53344B7-AF2D-4D7F-95D3-026441B671C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"FE86FF96-2C86-47A5-94BE-F17B271CA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"5DC6415E-F0D0-4C47-B048-733DA4B18D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"FB341641-C8C5-400C-A158-B094250219C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"F2578B50-83A2-459E-92F2-154934422303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A2963DDF-4741-4FDB-A4CB-0350AA17F85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"7E4C4E82-B26E-481B-856C-C89E03AEABA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"2B7E5396-E067-449F-8CE7-AC3B6432DA16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"F281BB9F-7A08-4B7B-8CA6-30050FDA44DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B2EDEDC5-307E-42D6-8539-5531BBC1A1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"4BA5C10C-6FCD-4C1A-958C-5B135EEE44F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"48CB9920-0517-4B3F-929D-E3CC5F4B4758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"210B462C-AAE4-40B4-B79A-741ED9FF17BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F149BAF2-76F4-49B2-A5F2-3E95F6A0473C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"B2773684-AD9E-43BF-B98C-263C707632E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6367B892-DE7D-4126-B787-CD380F28A35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"D838BD4B-B783-4BA8-841A-C8A3A0B8AC60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4F57BE44-C60D-4993-9F0C-777A66FDC1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"C450E6E2-C798-4E3C-8828-DCF4B9B226D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"1951D2BD-E9B9-481A-BA94-F162C4B1DBE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"9835CC02-7B53-45A7-807C-828075C86B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"CCB17E4B-69D5-4CC3-B05B-DE3309878C30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"E083CF51-92FF-44CE-8D5B-22C1AB182D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9B9D879B-CDA6-4C97-B883-2208EFADB564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"BE934985-CF87-4634-8241-513CA5BFAB8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"02A0DBBD-2F23-4774-9036-8BAD2DE73116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"A1339C21-9F4C-4B97-9BCF-1340193EE368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2BE156B5-068D-4B25-980B-4DA9C1E224F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.3.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"7C65DE89-E341-4524-8D28-821533422A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.3.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"76C05B9D-4F94-4A5C-9F4B-610366C5D14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"77B98598-1AAF-41B7-B6F2-C6FCD04880AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D2331F4E-1DD2-423F-A1A3-9BF0FCD1CA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"586E8711-3259-4435-B1A7-D1DDD04A0723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D18AE8A2-1041-46E7-AD07-FCBC4A0688B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"11AE07D3-163B-4724-ABE0-6344E118818D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4F6A7891-8592-4926-AAFE-AADE36BBE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"A11A9BC9-C446-4BB7-82B3-A1201B039EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"080D987D-5DBE-4C7E-8164-272D37C0FCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"F0F8EE01-9E25-4E04-85A3-7029645A329D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"82E0B6C6-762B-4D52-BBA9-006B57772BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"CCD405D8-4163-4B85-8502-A2B80A7CB71A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"77C03044-A3C8-4ADC-B61F-CA054E177221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"0DBCE2E5-254B-4B41-BCAD-466BB433E8E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"DA7FA2E5-2D11-4633-92DE-BA329BE44C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"054ED344-6EB3-4087-99B6-23C9EACD45DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6C596A8A-41CD-4C6C-84B9-655AB7B41D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B50A95CC-DCD0-434A-AA9B-845ADCB16BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D5807742-6617-4AE2-8B4D-B3D33C56934A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"C58C239B-65AB-4949-ADC4-26F6BCF03493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5166CBFE-E521-4B45-9C27-323B3688801A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:-:*:*:*\",\"matchCriteriaId\":\"E75C5767-493E-4F8F-AD2A-A59B1894CE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:lts:*:*:*\",\"matchCriteriaId\":\"18E2DDBC-A37B-47E4-84CF-7F043B311928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"AFCFBA66-3384-4CF2-A9C3-D68C920F0254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"7A89FD40-EA4A-4BEF-8E68-81985E5472CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1286A3D6-6714-4E07-AFCF-99DE4749E60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9C56648F-18DA-4BD3-86E7-6EF2AB9978F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"E8F12C0D-6044-4E2F-A782-D98D60004358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"FBA1CDBA-76BB-4661-8BF6-B73B8557DD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"4FEC8928-0DB6-4228-92B1-9BC001BF5816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"65CDB64E-B60B-44BB-9C4A-D064E7F892B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"DF1225D6-89B2-4AF7-97AA-812E56607432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"95CE7C9D-839E-47EF-949B-074285DDAD74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"4FD1C341-8009-4906-961E-0B8B0A96E6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D428D220-0F00-44F3-9243-CD2D597AD0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1AFE6CD8-1A7D-460E-986E-9F31525CB1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0CB302B8-F9DA-41DE-A2AD-C82601677BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9039EF3F-8AE0-40AC-B1E8-D412E548BB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B27B123C-603C-47E8-BCAB-CD0C21083639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B4F3B9A6-0A28-457B-A81F-ADBAEC073A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"49653FF2-5930-419F-A144-2D4844336EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.15:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B2663B1F-4FC4-4107-9826-99BAA7FB3AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"096CFD86-359A-4B6F-A532-FDFFD31D922C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2342CC92-8694-4C58-83E5-43809B1D62F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"78B41AA5-63D9-47A8-A7A8-AAA173923DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6661AC57-6AF4-4334-A82A-C8F69170CBFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"30BF81E9-4538-4018-9506-BB2A406463ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F48F829C-DE92-4153-BEC1-618F0544B88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"556A2A93-8707-4C39-86E7-66392B05B3C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0E5B52E8-F7FB-4D2B-B5EA-0F1C77D09BB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"63585F59-55B6-402A-975C-2427A925632B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2172F814-8E7C-4048-B62E-1932A6177468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.25:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54793923-444F-4196-AE5C-B54DDF08EC0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"271ACED8-48D7-44C8-888A-45BE5B2B7239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B196C227-3F7F-4C8C-AECC-3171E291AB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"9B4BB16D-106B-435A-9090-5E14225F7D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"482FD0F0-4C26-4182-A122-150D37FA0FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0F010DC-F86C-4B19-BF27-3ACCD5B65EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"D57CCD9C-0310-4B29-AEB5-B9C3BCF84BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1C0BC3BC-47DE-4472-B869-A5BB21F1241A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"3C836DF9-402D-4492-848C-8CABECCEBF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"E57BB02E-92A2-4C31-AEBA-220AC2B52139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0ED267C-F4F5-4F3D-B9D1-DEFC18E577D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0B46455-A3B3-46B9-B023-9C40999EC887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"BDB7F6E0-D7BB-4239-9BB6-CC538AFCC9F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"38B60909-E70D-45A1-B95F-0AC902DBF2AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"DC13C717-8DF5-47B0-89C3-6E9F4C27865A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"90854BD5-8939-4602-A7FF-3F1060B91B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"8E1859F6-F032-4BBB-B697-537E1AE08CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"D261EABB-12C7-4853-B8D2-1F7A0787934C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"82B2A6C2-8A96-44B9-AE44-CD03F4F1A348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"63DEF1FF-1209-4FE8-820A-614BC03A03B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"2396F8A8-9FAF-42B1-9404-9CABC7DAC27E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"848DA8F1-EF5E-4DBC-A1BB-1D39A2900726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"CAA1B613-6F57-4300-A531-053B57DFAD38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"D79890E9-E12B-42B3-90D3-1E262C9E2C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"080C6975-1041-4BBB-AAFB-DE2D141BBE90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54B19F39-5F7E-416A-AE4C-EEC04A6CA5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"594B6DB4-D871-4913-BCAD-1310FB51A249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"AD168932-0567-4E7E-A6C6-2467D2A90496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4B61796D-B50D-4D3D-9618-8070A8B12AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"977C6C07-A43D-4764-9106-2C710A5426EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C3A5FF85-F888-4791-9684-8120B0967604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.7:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"1DEFC847-C305-4DA5-8A4A-4734079E180E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D5191C70-5BBA-43EB-B7C6-F9103D600833\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6D036FDA-2054-4E79-A947-C6021E5C8779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"40A8768A-172A-4AA4-871D-4A4E0CB68B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A72A89EE-6CD8-408F-B76F-98F106308322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"19D9B726-0FF1-4566-9649-373E542F51E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A065A567-AC6A-483B-87B6-0E41DB9B447E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"46627889-BFEE-4B45-912F-E4C32C48E1FB\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7232272\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-1333\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-02T14:36:23.026891Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-02T14:36:26.318Z\"}}], \"cna\": {\"title\": \"IBM MQ Operator information disclosure\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.2.10:*:*:*:support_cycle_2:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"MQ Operator\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0 LTS\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.0.29 LTS\"}, {\"status\": \"affected\", \"version\": \"3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1 CD\"}, {\"status\": \"affected\", \"version\": \"3.2.0 SC2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.2.10 SC2\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Issues mentioned by this security bulletin are addressed in\\u00a0\\nIBM MQ Operator v3.5.2 CD release that included IBM supplied MQ Advanced 9.4.2.1-r1 container image. \\nIBM MQ Operator v3.2.11 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r1 container image.\\nIBM MQ Container 9.4.2.1-r1 release.\\nIBM strongly recommends applying the latest container images.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Issues mentioned by this security bulletin are addressed in\u0026nbsp;\u003cbr\u003eIBM MQ Operator v3.5.2 CD release that included IBM supplied MQ Advanced 9.4.2.1-r1 container image. \u003cbr\u003eIBM MQ Operator v3.2.11 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r1 container image.\u003cbr\u003eIBM MQ Container 9.4.2.1-r1 release.\u003cbr\u003eIBM strongly recommends applying the latest container images.\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7232272\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-214\", \"description\": \"CWE-214 Invocation of Process Using Visible Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-08-28T15:00:22.174Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-1333\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-28T15:00:22.174Z\", \"dateReserved\": \"2025-02-15T13:46:56.478Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-05-01T22:07:08.697Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…