CVE-2025-36041 (GCVE-0-2025-36041)
Vulnerability from cvelistv5 – Published: 2025-06-15 12:51 – Updated: 2025-08-24 11:52
VLAI?
Summary
IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions.
Severity ?
4.7 (Medium)
CWE
- CWE-295 - Improper Certificate Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | MQ Operator |
Affected:
2.0.0 LTS , ≤ 2.0.29 LTS
(semver)
Affected: 3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1, 3.5.3 CD Affected: 3.2.0 SC2 , ≤ 3.2.10 SC2 (semver) cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.5.3:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:* cpe:2.3:a:ibm:mq_operator:3.2.12:*:*:*:support_cycle_2:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-36041",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-16T13:38:47.283894Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-16T13:39:03.554Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.5.3:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*",
"cpe:2.3:a:ibm:mq_operator:3.2.12:*:*:*:support_cycle_2:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MQ Operator",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "2.0.29 LTS",
"status": "affected",
"version": "2.0.0 LTS",
"versionType": "semver"
},
{
"status": "affected",
"version": "3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1, 3.5.3 CD"
},
{
"lessThanOrEqual": "3.2.10 SC2",
"status": "affected",
"version": "3.2.0 SC2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions."
}
],
"value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-24T11:52:26.288Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7236608"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Issues mentioned by this security bulletin are addressed in -\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.0 CD release that included IBM supplied MQ Advanced 9.4.3.0-r1 container image. \u003cbr\u003eIBM MQ Operator v3.2.13 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r3 container image.\u003cbr\u003eIBM MQ Container 9.4.3.0-r1 release.\u003cbr\u003eNote: \n\nCVE-2025-36041\n\n is applicable only for IBM MQ Operator v3.6.0 CD and IBM supplied MQ Advanced 9.4.3.0-r1 container image.\u003cbr\u003e\u003cbr\u003eIBM strongly recommends applying the latest container images. \u003cbr\u003e"
}
],
"value": "Issues mentioned by this security bulletin are addressed in -\n\nIBM MQ Operator v3.6.0 CD release that included IBM supplied MQ Advanced 9.4.3.0-r1 container image. \nIBM MQ Operator v3.2.13 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r3 container image.\nIBM MQ Container 9.4.3.0-r1 release.\nNote: \n\nCVE-2025-36041\n\n is applicable only for IBM MQ Operator v3.6.0 CD and IBM supplied MQ Advanced 9.4.3.0-r1 container image.\n\nIBM strongly recommends applying the latest container images."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM MQ improper certificate validation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-36041",
"datePublished": "2025-06-15T12:51:06.394Z",
"dateReserved": "2025-04-15T21:16:10.568Z",
"dateUpdated": "2025-08-24T11:52:26.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-36041\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-06-15T13:15:33.177\",\"lastModified\":\"2025-08-22T18:33:01.490\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions.\"},{\"lang\":\"es\",\"value\":\"IBM MQ Operator LTS 2.0.0 a 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 a 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 a 3.5.3 y MQ Operator SC2 3.2.0 a 3.2.12 Native HA CRR podr\u00edan configurarse con una clave privada y una cadena distinta a la clave prevista, lo que podr\u00eda revelar informaci\u00f3n confidencial o permitir que el atacante realice acciones no autorizadas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.0.29\",\"matchCriteriaId\":\"F7AFB54D-40A4-4F84-AFFF-CB281A60B4FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndIncluding\":\"2.2.2\",\"matchCriteriaId\":\"976E62F2-8B84-48A7-B4EF-0F0E3100BCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndIncluding\":\"2.3.3\",\"matchCriteriaId\":\"A899D4D9-04D0-404E-95BA-BFA1874B1188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.8\",\"matchCriteriaId\":\"F3142CD8-16DC-4298-A545-4BEDEBB3A20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:cd:*:*:*\",\"versionStartIncluding\":\"3.1.0\",\"versionEndIncluding\":\"3.1.3\",\"matchCriteriaId\":\"E76199DF-C063-498D-99B1-61FCAF92BA28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:sc2:*:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndIncluding\":\"3.2.12\",\"matchCriteriaId\":\"18DDB9C6-C28D-4361-B302-99CE1D6C2D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:*:*:*:*:cd:*:*:*\",\"versionStartIncluding\":\"3.5.1\",\"versionEndIncluding\":\"3.5.3\",\"matchCriteriaId\":\"507191E3-2D47-4D43-A297-782706102362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"FE86FF96-2C86-47A5-94BE-F17B271CA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"5DC6415E-F0D0-4C47-B048-733DA4B18D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"FB341641-C8C5-400C-A158-B094250219C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"F2578B50-83A2-459E-92F2-154934422303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A2963DDF-4741-4FDB-A4CB-0350AA17F85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:cd:*:*:*\",\"matchCriteriaId\":\"7E4C4E82-B26E-481B-856C-C89E03AEABA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"F281BB9F-7A08-4B7B-8CA6-30050FDA44DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B2EDEDC5-307E-42D6-8539-5531BBC1A1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"4BA5C10C-6FCD-4C1A-958C-5B135EEE44F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"48CB9920-0517-4B3F-929D-E3CC5F4B4758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"210B462C-AAE4-40B4-B79A-741ED9FF17BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F149BAF2-76F4-49B2-A5F2-3E95F6A0473C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"B2773684-AD9E-43BF-B98C-263C707632E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6367B892-DE7D-4126-B787-CD380F28A35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"D838BD4B-B783-4BA8-841A-C8A3A0B8AC60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4F57BE44-C60D-4993-9F0C-777A66FDC1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"C450E6E2-C798-4E3C-8828-DCF4B9B226D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"1951D2BD-E9B9-481A-BA94-F162C4B1DBE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"9835CC02-7B53-45A7-807C-828075C86B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"CCB17E4B-69D5-4CC3-B05B-DE3309878C30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"E083CF51-92FF-44CE-8D5B-22C1AB182D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9B9D879B-CDA6-4C97-B883-2208EFADB564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"BE934985-CF87-4634-8241-513CA5BFAB8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"02A0DBBD-2F23-4774-9036-8BAD2DE73116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:-:*:*:*\",\"matchCriteriaId\":\"A1339C21-9F4C-4B97-9BCF-1340193EE368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2BE156B5-068D-4B25-980B-4DA9C1E224F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.3.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"7C65DE89-E341-4524-8D28-821533422A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.3.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"76C05B9D-4F94-4A5C-9F4B-610366C5D14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"77B98598-1AAF-41B7-B6F2-C6FCD04880AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D2331F4E-1DD2-423F-A1A3-9BF0FCD1CA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"586E8711-3259-4435-B1A7-D1DDD04A0723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D18AE8A2-1041-46E7-AD07-FCBC4A0688B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"11AE07D3-163B-4724-ABE0-6344E118818D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4F6A7891-8592-4926-AAFE-AADE36BBE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"A11A9BC9-C446-4BB7-82B3-A1201B039EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"080D987D-5DBE-4C7E-8164-272D37C0FCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"F0F8EE01-9E25-4E04-85A3-7029645A329D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"82E0B6C6-762B-4D52-BBA9-006B57772BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"CCD405D8-4163-4B85-8502-A2B80A7CB71A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"77C03044-A3C8-4ADC-B61F-CA054E177221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"0DBCE2E5-254B-4B41-BCAD-466BB433E8E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"DA7FA2E5-2D11-4633-92DE-BA329BE44C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"054ED344-6EB3-4087-99B6-23C9EACD45DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6C596A8A-41CD-4C6C-84B9-655AB7B41D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B50A95CC-DCD0-434A-AA9B-845ADCB16BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D5807742-6617-4AE2-8B4D-B3D33C56934A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"C58C239B-65AB-4949-ADC4-26F6BCF03493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5166CBFE-E521-4B45-9C27-323B3688801A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:-:*:*:*\",\"matchCriteriaId\":\"E75C5767-493E-4F8F-AD2A-A59B1894CE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:lts:*:*:*\",\"matchCriteriaId\":\"18E2DDBC-A37B-47E4-84CF-7F043B311928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"AFCFBA66-3384-4CF2-A9C3-D68C920F0254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"7A89FD40-EA4A-4BEF-8E68-81985E5472CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1286A3D6-6714-4E07-AFCF-99DE4749E60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9C56648F-18DA-4BD3-86E7-6EF2AB9978F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"E8F12C0D-6044-4E2F-A782-D98D60004358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"FBA1CDBA-76BB-4661-8BF6-B73B8557DD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"4FEC8928-0DB6-4228-92B1-9BC001BF5816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"65CDB64E-B60B-44BB-9C4A-D064E7F892B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"DF1225D6-89B2-4AF7-97AA-812E56607432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"95CE7C9D-839E-47EF-949B-074285DDAD74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"4FD1C341-8009-4906-961E-0B8B0A96E6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D428D220-0F00-44F3-9243-CD2D597AD0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1AFE6CD8-1A7D-460E-986E-9F31525CB1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0CB302B8-F9DA-41DE-A2AD-C82601677BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"9039EF3F-8AE0-40AC-B1E8-D412E548BB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B27B123C-603C-47E8-BCAB-CD0C21083639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B4F3B9A6-0A28-457B-A81F-ADBAEC073A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"49653FF2-5930-419F-A144-2D4844336EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.15:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B2663B1F-4FC4-4107-9826-99BAA7FB3AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"096CFD86-359A-4B6F-A532-FDFFD31D922C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2342CC92-8694-4C58-83E5-43809B1D62F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"78B41AA5-63D9-47A8-A7A8-AAA173923DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6661AC57-6AF4-4334-A82A-C8F69170CBFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"30BF81E9-4538-4018-9506-BB2A406463ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F48F829C-DE92-4153-BEC1-618F0544B88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.20:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"556A2A93-8707-4C39-86E7-66392B05B3C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"0E5B52E8-F7FB-4D2B-B5EA-0F1C77D09BB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"63585F59-55B6-402A-975C-2427A925632B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.21:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"2172F814-8E7C-4048-B62E-1932A6177468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.25:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54793923-444F-4196-AE5C-B54DDF08EC0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"271ACED8-48D7-44C8-888A-45BE5B2B7239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B196C227-3F7F-4C8C-AECC-3171E291AB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"9B4BB16D-106B-435A-9090-5E14225F7D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"482FD0F0-4C26-4182-A122-150D37FA0FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0F010DC-F86C-4B19-BF27-3ACCD5B65EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"D57CCD9C-0310-4B29-AEB5-B9C3BCF84BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"1C0BC3BC-47DE-4472-B869-A5BB21F1241A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"3C836DF9-402D-4492-848C-8CABECCEBF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"E57BB02E-92A2-4C31-AEBA-220AC2B52139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0ED267C-F4F5-4F3D-B9D1-DEFC18E577D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"B0B46455-A3B3-46B9-B023-9C40999EC887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"BDB7F6E0-D7BB-4239-9BB6-CC538AFCC9F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"38B60909-E70D-45A1-B95F-0AC902DBF2AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"DC13C717-8DF5-47B0-89C3-6E9F4C27865A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r3:*:*:-:*:*:*\",\"matchCriteriaId\":\"90854BD5-8939-4602-A7FF-3F1060B91B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r1:*:*:-:*:*:*\",\"matchCriteriaId\":\"8E1859F6-F032-4BBB-B697-537E1AE08CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r2:*:*:-:*:*:*\",\"matchCriteriaId\":\"D261EABB-12C7-4853-B8D2-1F7A0787934C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"82B2A6C2-8A96-44B9-AE44-CD03F4F1A348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"63DEF1FF-1209-4FE8-820A-614BC03A03B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"2396F8A8-9FAF-42B1-9404-9CABC7DAC27E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"848DA8F1-EF5E-4DBC-A1BB-1D39A2900726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"CAA1B613-6F57-4300-A531-053B57DFAD38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"D79890E9-E12B-42B3-90D3-1E262C9E2C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"080C6975-1041-4BBB-AAFB-DE2D141BBE90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"54B19F39-5F7E-416A-AE4C-EEC04A6CA5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.0:r3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"594B6DB4-D871-4913-BCAD-1310FB51A249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"AD168932-0567-4E7E-A6C6-2467D2A90496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.5:r2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4B61796D-B50D-4D3D-9618-8070A8B12AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"CF0D971B-CC71-4A7A-97A3-87D031F76C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.6:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"C9B9FE2C-E27A-468A-BEE2-7DC2DE3BE67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.7:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"D11E13D1-FE9C-456B-85F3-C5A8B66074E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"F4B616A8-73DE-4AB8-AD2D-3DC7E28AD5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.10:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"2F942CCF-1A4C-4B08-B3D2-8003BD4DB8F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.11:r1:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"46B69936-F207-4F6F-A657-838151F381FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.0.11:r2:*:*:sc2:*:*:*\",\"matchCriteriaId\":\"6155E304-339A-4228-B10F-E5FEFB9AB77C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"40A8768A-172A-4AA4-871D-4A4E0CB68B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A72A89EE-6CD8-408F-B76F-98F106308322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.1.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"19D9B726-0FF1-4566-9649-373E542F51E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"A065A567-AC6A-483B-87B6-0E41DB9B447E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.0:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"46627889-BFEE-4B45-912F-E4C32C48E1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.1:r1:*:*:cd:*:*:*\",\"matchCriteriaId\":\"B785F246-B526-4C0A-A0E2-6C84B1C2510F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.4.2.1:r2:*:*:cd:*:*:*\",\"matchCriteriaId\":\"69C2278D-C649-44E0-8D55-96A379853354\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7236608\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-36041\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-16T13:38:47.283894Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-16T13:38:54.716Z\"}}], \"cna\": {\"title\": \"IBM MQ improper certificate validation\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.3.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.4.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.0:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.1:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.5.3:*:*:*:continuous_delivery:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:2.0.29:*:*:*:lts:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.2.0:*:*:*:support_cycle_2:*:*:*\", \"cpe:2.3:a:ibm:mq_operator:3.2.12:*:*:*:support_cycle_2:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"MQ Operator\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0 LTS\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.0.29 LTS\"}, {\"status\": \"affected\", \"version\": \"3.0.0, 3.0.1, 3.1.0, 3.1.3, 3.4.0, 3.5.0, 3.5.1, 3.5.3 CD\"}, {\"status\": \"affected\", \"version\": \"3.2.0 SC2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.2.10 SC2\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Issues mentioned by this security bulletin are addressed in -\\n\\nIBM MQ Operator v3.6.0 CD release that included IBM supplied MQ Advanced 9.4.3.0-r1 container image. \\nIBM MQ Operator v3.2.13 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r3 container image.\\nIBM MQ Container 9.4.3.0-r1 release.\\nNote: \\n\\nCVE-2025-36041\\n\\n is applicable only for IBM MQ Operator v3.6.0 CD and IBM supplied MQ Advanced 9.4.3.0-r1 container image.\\n\\nIBM strongly recommends applying the latest container images.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Issues mentioned by this security bulletin are addressed in -\u003cbr\u003e\u003cbr\u003eIBM MQ Operator v3.6.0 CD release that included IBM supplied MQ Advanced 9.4.3.0-r1 container image. \u003cbr\u003eIBM MQ Operator v3.2.13 SC2 release that included IBM supplied MQ Advanced 9.4.0.11-r3 container image.\u003cbr\u003eIBM MQ Container 9.4.3.0-r1 release.\u003cbr\u003eNote: \\n\\nCVE-2025-36041\\n\\n is applicable only for IBM MQ Operator v3.6.0 CD and IBM supplied MQ Advanced 9.4.3.0-r1 container image.\u003cbr\u003e\u003cbr\u003eIBM strongly recommends applying the latest container images. \u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7236608\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-08-24T11:52:26.288Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-36041\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-24T11:52:26.288Z\", \"dateReserved\": \"2025-04-15T21:16:10.568Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-06-15T12:51:06.394Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…