CVE-2025-36005 (GCVE-0-2025-36005)
Vulnerability from cvelistv5 – Published: 2025-07-24 14:52 – Updated: 2025-08-17 01:24
VLAI?
Summary
IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation.
Severity ?
5.9 (Medium)
CWE
- CWE-295 - Improper Certificate Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| IBM | MQ Operator |
Affected:
2.0.0 LTS , ≤ 2.0.29 LTS
(semver)
cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:* |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-36005",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-24T15:03:30.894944Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-24T15:04:05.741Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MQ Operator",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "2.0.29 LTS",
"status": "affected",
"version": "2.0.0 LTS",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.6.0:*:*:*:continuous_delivery:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MQ Operator",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1, 3.6.0 CD"
}
]
},
{
"cpes": [
"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.2.13:*:*:*:support_cycle_2:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MQ Operator",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "3.2.13 SC2",
"status": "affected",
"version": "3.2.0 SC2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation."
}
],
"value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-17T01:24:38.369Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7240431"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Issues mentioned by this security bulletin are addressed in -\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.1 CD release that included IBM supplied MQ Advanced 9.4.3.0-r2 container image. \u003cbr\u003eIBM MQ Operator v3.2.14 SC2 release that included IBM supplied MQ Advanced 9.4.0.12-r1 container image.\u003cbr\u003eIBM MQ Container 9.4.3.0-r2 release.\u003cbr\u003eIBM strongly recommends applying the latest container images. \u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.1 CD release details:\u003cbr\u003eibm-mq-operator\u0026nbsp;v3.6.1 icr.io\u0026nbsp;icr.io/cpopen/ibm-mq-operator@sha256:b1bbebeb361e9e59311684da233c7d5978ffe17a78feb03eeb2411df9a0f5d03\u003cbr\u003eibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io\u0026nbsp;cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\u003cbr\u003eibm-mqadvanced-server-integration 9.4.3.0-r2 cp.icr.io\u0026nbsp;cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:534c801a22338398bfb61ae443eeb6ba84152f0fad5538e212eefab1498336ed\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.3.0-r2\u0026nbsp;icr.io\u0026nbsp;icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.2.14 SC2 release details:\u003cbr\u003eibm-mq-operator\u0026nbsp;v3.2.14 icr.io\u0026nbsp;icr.io/cpopen/ibm-mq-operator@sha256:3979ba0bc28b6302f453633d3d238323c52679550760803d503ca51073c98cbf\u003cbr\u003eibm-mqadvanced-server\u0026nbsp;9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:222c1500565d08d6ab4dff9c7d550ce9e12909735e699882b79632ebe00dd61d\u003cbr\u003eibm-mqadvanced-server-integration 9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:762f4f5e04c682f9ce39d6e189999fb505e373a60791f5a91fc413e4a72be014\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.0.12-r1 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:2d5fa97b1e7f4d3d27c9afa963876172dc634ac861e3a5c5cb1cbf1e81252e15\u003cbr\u003e\u003cbr\u003eIBM MQ Container 9.4.3.0-r2 release details:\u003cbr\u003eibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.3.0-r2 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\u003cbr\u003e"
}
],
"value": "Issues mentioned by this security bulletin are addressed in -\n\nIBM MQ Operator v3.6.1 CD release that included IBM supplied MQ Advanced 9.4.3.0-r2 container image. \nIBM MQ Operator v3.2.14 SC2 release that included IBM supplied MQ Advanced 9.4.0.12-r1 container image.\nIBM MQ Container 9.4.3.0-r2 release.\nIBM strongly recommends applying the latest container images. \n\nIBM MQ Operator v3.6.1 CD release details:\nibm-mq-operator\u00a0v3.6.1 icr.io\u00a0icr.io/cpopen/ibm-mq-operator@sha256:b1bbebeb361e9e59311684da233c7d5978ffe17a78feb03eeb2411df9a0f5d03\nibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io\u00a0cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\nibm-mqadvanced-server-integration 9.4.3.0-r2 cp.icr.io\u00a0cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:534c801a22338398bfb61ae443eeb6ba84152f0fad5538e212eefab1498336ed\nibm-mqadvanced-server-dev\u00a09.4.3.0-r2\u00a0icr.io\u00a0icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\n\nIBM MQ Operator v3.2.14 SC2 release details:\nibm-mq-operator\u00a0v3.2.14 icr.io\u00a0icr.io/cpopen/ibm-mq-operator@sha256:3979ba0bc28b6302f453633d3d238323c52679550760803d503ca51073c98cbf\nibm-mqadvanced-server\u00a09.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:222c1500565d08d6ab4dff9c7d550ce9e12909735e699882b79632ebe00dd61d\nibm-mqadvanced-server-integration 9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:762f4f5e04c682f9ce39d6e189999fb505e373a60791f5a91fc413e4a72be014\nibm-mqadvanced-server-dev\u00a09.4.0.12-r1 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:2d5fa97b1e7f4d3d27c9afa963876172dc634ac861e3a5c5cb1cbf1e81252e15\n\nIBM MQ Container 9.4.3.0-r2 release details:\nibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\nibm-mqadvanced-server-dev\u00a09.4.3.0-r2 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM MQ Operator information disclosure",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-36005",
"datePublished": "2025-07-24T14:52:53.238Z",
"dateReserved": "2025-04-15T21:16:05.532Z",
"dateUpdated": "2025-08-17T01:24:38.369Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-36005\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-07-24T15:15:26.083\",\"lastModified\":\"2025-08-22T18:08:49.657\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation.\"},{\"lang\":\"es\",\"value\":\"Internet Pass-Thru en IBM MQ Operator LTS 2.0.0 a 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 a 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0 y MQ Operator SC2 3.2.0 a 3.2.13 podr\u00eda permitir que un usuario malintencionado obtenga informaci\u00f3n confidencial de otra conexi\u00f3n de sesi\u00f3n TLS a trav\u00e9s del proxy al mismo nombre de host y puerto debido a una validaci\u00f3n de certificado incorrecta.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.0.29\",\"matchCriteriaId\":\"F7AFB54D-40A4-4F84-AFFF-CB281A60B4FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:sc2:*:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndIncluding\":\"3.2.13\",\"matchCriteriaId\":\"9F201800-9E6A-40ED-84F3-CEAAE48B8A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:cd:*:*:*\",\"versionStartIncluding\":\"3.5.1\",\"versionEndIncluding\":\"3.6.0\",\"matchCriteriaId\":\"754475E5-89D1-4E26-9A78-A8767A8BA8C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"FB341641-C8C5-400C-A158-B094250219C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"F2578B50-83A2-459E-92F2-154934422303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A2963DDF-4741-4FDB-A4CB-0350AA17F85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"7E4C4E82-B26E-481B-856C-C89E03AEABA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"82E0B6C6-762B-4D52-BBA9-006B57772BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"77C03044-A3C8-4ADC-B61F-CA054E177221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"DA7FA2E5-2D11-4633-92DE-BA329BE44C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6C596A8A-41CD-4C6C-84B9-655AB7B41D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D5807742-6617-4AE2-8B4D-B3D33C56934A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5166CBFE-E521-4B45-9C27-323B3688801A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:lts:*:*:*\",\"matchCriteriaId\":\"18E2DDBC-A37B-47E4-84CF-7F043B311928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"7A89FD40-EA4A-4BEF-8E68-81985E5472CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9C56648F-18DA-4BD3-86E7-6EF2AB9978F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"FBA1CDBA-76BB-4661-8BF6-B73B8557DD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"65CDB64E-B60B-44BB-9C4A-D064E7F892B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"95CE7C9D-839E-47EF-949B-074285DDAD74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D428D220-0F00-44F3-9243-CD2D597AD0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0CB302B8-F9DA-41DE-A2AD-C82601677BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9039EF3F-8AE0-40AC-B1E8-D412E548BB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B27B123C-603C-47E8-BCAB-CD0C21083639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B4F3B9A6-0A28-457B-A81F-ADBAEC073A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"49653FF2-5930-419F-A144-2D4844336EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.15:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B2663B1F-4FC4-4107-9826-99BAA7FB3AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"096CFD86-359A-4B6F-A532-FDFFD31D922C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2342CC92-8694-4C58-83E5-43809B1D62F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"78B41AA5-63D9-47A8-A7A8-AAA173923DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6661AC57-6AF4-4334-A82A-C8F69170CBFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"30BF81E9-4538-4018-9506-BB2A406463ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F48F829C-DE92-4153-BEC1-618F0544B88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"556A2A93-8707-4C39-86E7-66392B05B3C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0E5B52E8-F7FB-4D2B-B5EA-0F1C77D09BB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"63585F59-55B6-402A-975C-2427A925632B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2172F814-8E7C-4048-B62E-1932A6177468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.25:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54793923-444F-4196-AE5C-B54DDF08EC0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"080C6975-1041-4BBB-AAFB-DE2D141BBE90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54B19F39-5F7E-416A-AE4C-EEC04A6CA5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"594B6DB4-D871-4913-BCAD-1310FB51A249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"AD168932-0567-4E7E-A6C6-2467D2A90496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4B61796D-B50D-4D3D-9618-8070A8B12AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"CF0D971B-CC71-4A7A-97A3-87D031F76C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"C9B9FE2C-E27A-468A-BEE2-7DC2DE3BE67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.7:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"D11E13D1-FE9C-456B-85F3-C5A8B66074E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"F4B616A8-73DE-4AB8-AD2D-3DC7E28AD5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"2F942CCF-1A4C-4B08-B3D2-8003BD4DB8F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.11:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"46B69936-F207-4F6F-A657-838151F381FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.11:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"6155E304-339A-4228-B10F-E5FEFB9AB77C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.11:r3:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"1F98E91D-8B45-42D9-9AB3-0D3B4016BE2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"40A8768A-172A-4AA4-871D-4A4E0CB68B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A72A89EE-6CD8-408F-B76F-98F106308322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"19D9B726-0FF1-4566-9649-373E542F51E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A065A567-AC6A-483B-87B6-0E41DB9B447E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"46627889-BFEE-4B45-912F-E4C32C48E1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"B785F246-B526-4C0A-A0E2-6C84B1C2510F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.1:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"69C2278D-C649-44E0-8D55-96A379853354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.3.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"35555450-B67F-43B9-BB7E-502901CDA054\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7240431\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-36005\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-24T15:03:30.894944Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-24T15:03:59.841Z\"}}], \"cna\": {\"title\": \"IBM MQ Operator information disclosure\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"MQ Operator\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0 LTS\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.0.29 LTS\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.6.0:*:*:*:continuous_delivery:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"MQ Operator\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1, 3.6.0 CD\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.2.13:*:*:*:support_cycle_2:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"MQ Operator\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.2.0 SC2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.2.13 SC2\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Issues mentioned by this security bulletin are addressed in -\\n\\nIBM MQ Operator v3.6.1 CD release that included IBM supplied MQ Advanced 9.4.3.0-r2 container image. \\nIBM MQ Operator v3.2.14 SC2 release that included IBM supplied MQ Advanced 9.4.0.12-r1 container image.\\nIBM MQ Container 9.4.3.0-r2 release.\\nIBM strongly recommends applying the latest container images. \\n\\nIBM MQ Operator v3.6.1 CD release details:\\nibm-mq-operator\\u00a0v3.6.1 icr.io\\u00a0icr.io/cpopen/ibm-mq-operator@sha256:b1bbebeb361e9e59311684da233c7d5978ffe17a78feb03eeb2411df9a0f5d03\\nibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io\\u00a0cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\\nibm-mqadvanced-server-integration 9.4.3.0-r2 cp.icr.io\\u00a0cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:534c801a22338398bfb61ae443eeb6ba84152f0fad5538e212eefab1498336ed\\nibm-mqadvanced-server-dev\\u00a09.4.3.0-r2\\u00a0icr.io\\u00a0icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\\n\\nIBM MQ Operator v3.2.14 SC2 release details:\\nibm-mq-operator\\u00a0v3.2.14 icr.io\\u00a0icr.io/cpopen/ibm-mq-operator@sha256:3979ba0bc28b6302f453633d3d238323c52679550760803d503ca51073c98cbf\\nibm-mqadvanced-server\\u00a09.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:222c1500565d08d6ab4dff9c7d550ce9e12909735e699882b79632ebe00dd61d\\nibm-mqadvanced-server-integration 9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:762f4f5e04c682f9ce39d6e189999fb505e373a60791f5a91fc413e4a72be014\\nibm-mqadvanced-server-dev\\u00a09.4.0.12-r1 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:2d5fa97b1e7f4d3d27c9afa963876172dc634ac861e3a5c5cb1cbf1e81252e15\\n\\nIBM MQ Container 9.4.3.0-r2 release details:\\nibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\\nibm-mqadvanced-server-dev\\u00a09.4.3.0-r2 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Issues mentioned by this security bulletin are addressed in -\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.1 CD release that included IBM supplied MQ Advanced 9.4.3.0-r2 container image. \u003cbr\u003eIBM MQ Operator v3.2.14 SC2 release that included IBM supplied MQ Advanced 9.4.0.12-r1 container image.\u003cbr\u003eIBM MQ Container 9.4.3.0-r2 release.\u003cbr\u003eIBM strongly recommends applying the latest container images. \u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.1 CD release details:\u003cbr\u003eibm-mq-operator\u0026nbsp;v3.6.1 icr.io\u0026nbsp;icr.io/cpopen/ibm-mq-operator@sha256:b1bbebeb361e9e59311684da233c7d5978ffe17a78feb03eeb2411df9a0f5d03\u003cbr\u003eibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io\u0026nbsp;cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\u003cbr\u003eibm-mqadvanced-server-integration 9.4.3.0-r2 cp.icr.io\u0026nbsp;cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:534c801a22338398bfb61ae443eeb6ba84152f0fad5538e212eefab1498336ed\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.3.0-r2\u0026nbsp;icr.io\u0026nbsp;icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.2.14 SC2 release details:\u003cbr\u003eibm-mq-operator\u0026nbsp;v3.2.14 icr.io\u0026nbsp;icr.io/cpopen/ibm-mq-operator@sha256:3979ba0bc28b6302f453633d3d238323c52679550760803d503ca51073c98cbf\u003cbr\u003eibm-mqadvanced-server\u0026nbsp;9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:222c1500565d08d6ab4dff9c7d550ce9e12909735e699882b79632ebe00dd61d\u003cbr\u003eibm-mqadvanced-server-integration 9.4.0.12-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:762f4f5e04c682f9ce39d6e189999fb505e373a60791f5a91fc413e4a72be014\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.0.12-r1 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:2d5fa97b1e7f4d3d27c9afa963876172dc634ac861e3a5c5cb1cbf1e81252e15\u003cbr\u003e\u003cbr\u003eIBM MQ Container 9.4.3.0-r2 release details:\u003cbr\u003eibm-mqadvanced-server 9.4.3.0-r2 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:5bd01da84348f4ffb8b96427b6b8a4c471e63153f13e912315c3e7c9b3fffa8d\u003cbr\u003eibm-mqadvanced-server-dev\u0026nbsp;9.4.3.0-r2 icr.io icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:c2166a034f620d7479741342255968fe4076e8ce0bf45f1d67705ff1635146d5\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7240431\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-08-17T01:24:38.369Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-36005\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-17T01:24:38.369Z\", \"dateReserved\": \"2025-04-15T21:16:05.532Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-07-24T14:52:53.238Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…