5.5
CVE-2025-36058
- EPSS 0.01%
- Veröffentlicht 20.01.2026 15:09:07
- Zuletzt bearbeitet 17.02.2026 17:29:28
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 006. IBM Cloud Pak for Business Automation and IBM Business Automation Workflow containers may disclose sensitve configuration information in a config map.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Business Automation Workflow Version24.0.0 Update- SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif001 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif002 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif003 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif004 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif005 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.0 Updateif006 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.1 Update- SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.1 Updateif001 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.1 Updateif002 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.1 Updateif004 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version24.0.1 Updateif005 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version25.0.0 Update- SwEditioncontainers
Ibm ≫ Business Automation Workflow Version25.0.0 Updateif001 SwEditioncontainers
Ibm ≫ Business Automation Workflow Version25.0.0 Updateif002 SwEditioncontainers
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.026 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.