5.5

CVE-2025-36058

IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 006. IBM Cloud Pak for Business Automation and IBM Business Automation Workflow containers may disclose sensitve configuration information in a config map.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IbmBusiness Automation Workflow Version24.0.0 Update- SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif001 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif002 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif003 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif004 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif005 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.0 Updateif006 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.1 Update- SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.1 Updateif001 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.1 Updateif002 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.1 Updateif004 SwEditioncontainers
IbmBusiness Automation Workflow Version24.0.1 Updateif005 SwEditioncontainers
IbmBusiness Automation Workflow Version25.0.0 Update- SwEditioncontainers
IbmBusiness Automation Workflow Version25.0.0 Updateif001 SwEditioncontainers
IbmBusiness Automation Workflow Version25.0.0 Updateif002 SwEditioncontainers
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.026
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@us.ibm.com 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory

The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.