Impact
The vulnerability in the IBM Maximo Application Suite Monitor Component allows an unauthorized user to insert arbitrary text into log entries because special characters are not properly neutralized. This flaw, classified as CWE‑117, results in forged log messages that appear legitimate, thereby undermining the integrity of audit trails, alerting mechanisms, and monitoring tools. The flaw does not provide code execution or elevate privileges, but it can conceal malicious activity or mislead investigations.
Affected Systems
Affected systems include the IBM Maximo Application Suite Monitor Component in releases 8.10, 8.11, 9.0 and 9.1. The vendor documentation identifies the vulnerable releases as 8.10.0 through 8.10.26, 8.11.0 through 8.11.24, 9.0.0 through 9.0.16, and 9.1.0 through 9.1.6, and provides patch versions 8.10.26, 8.11.24, 9.0.16 and 9.1.6 for remediation.
Risk and Exploitability
The CVSS base score of 4.0 indicates a medium severity, and the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. An attacker would typically need a user account that can submit data to the Monitor Component; special privileges or remote code execution are not required. By injecting deceptive content into logs, an adversary can make legitimate entries appear fabricated, potentially hiding other attacks or misdirecting forensic analysis. Prompt application of the vendor’s patch removes the vulnerable code path and restores trust in log data.
OpenCVE Enrichment