Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-36373— Incorrect administrative access control in IBM DataPower Gateway

CVSS 4.1 · Medium EPSS 0.04% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-36373

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Incorrect administrative access control in IBM DataPower Gateway
Source: NVD (National Vulnerability Database)
Vulnerability Description
IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway 10.5.0 10.5.0.0 through 10.5.0.20 and IBM DataPower Gateway 10.6.0 10.6.0.0 through 10.6.0.8 IBM DataPower Gateway could disclose sensitive system information from other domains to an administrative user.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
将系统数据暴露到未授权控制的范围
Source: NVD (National Vulnerability Database)
Vulnerability Title
IBM DataPower Gateway 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IBM DataPower Gateway是美国国际商业机器(IBM)公司的一套专门为移动、云、应用编程接口(API)、网络、面向服务架构(SOA)、B2B和云工作负载而设计的安全和集成平台。该平台可利用专用网关平台跨渠道保护、集成和优化访问。 IBM DataPower Gateway存在安全漏洞,该漏洞源于可能向管理员用户泄露其他域的敏感系统信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
IBMDataPower Gateway 10.6CD 10.6.1.0 ~ 10.6.5.0 cpe:2.3:a:ibm:datapower_gateway_106cd:10.6.1.0:*:*:*:*:*:*:*
IBMDataPower Gateway 10.5.0 10.5.0.0 ~ 10.5.0.20 cpe:2.3:a:ibm:datapower_gateway_1050:10.5.0.0:*:*:*:*:*:*:*
IBMDataPower Gateway 10.6.0 10.6.0.0 ~ 10.6.0.8 cpe:2.3:a:ibm:datapower_gateway_1060:10.6.0.0:*:*:*:*:*:*:*

II. Public POCs for CVE-2025-36373

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-36373

登录查看更多情报信息。

Same Patch Batch · IBM · 2026-04-01 · 16 CVEs total

CVE-2026-41018.1 HIGHSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2025-138557.6 HIGHIBM Storage Protect Server is affected by a vulnerability that could allow authenticated u
CVE-2026-13457.3 HIGHSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2025-363756.5 MEDIUMIBM DataPower Gateway vulnerable to CSRF
CVE-2025-664836.3 MEDIUMMultiple vulnerabilities have been addressed in IBM Aspera Shares
CVE-2025-139165.9 MEDIUMMultiple vulnerabilities have been addressed in IBM Aspera Shares
CVE-2025-664845.5 MEDIUMMultiple vulnerabilities have been addressed in IBM Aspera Shares
CVE-2025-664855.4 MEDIUMMultiple vulnerabilities have been addressed in IBM Aspera Shares
CVE-2026-43645.4 MEDIUMSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2026-14915.3 MEDIUMSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2026-28625.3 MEDIUMSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2025-664864.8 MEDIUMMultiple vulnerabilities have been addressed in IBM Aspera Shares
CVE-2026-48204.3 MEDIUMIBM Maximo Application Suite was vulnerable to because Cookie ltpatoken2_<workspace_name>
CVE-2026-24753.1 LOWSecurity Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Ve
CVE-2025-664872.7 LOWMultiple vulnerabilities have been addressed in IBM Aspera Shares

IV. Related Vulnerabilities

V. Comments for CVE-2025-36373

No comments yet


Leave a comment