Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Download the script from here: Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes It is strongly recommended that you apply the most recent security updates: Affected Product(s)Version(s)Interim FixIBM Controller11.1.0 - 11.1.1 Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes IBM Cognos Controller11.0.0 - 11.0.1 Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes Prerequisites * Ensure you are logged in to the server with System Administrator privileges. * Create a backup of the server.js file located in the product installation path (e.g., C:\ccr_64\frontend) before proceeding. Procedure * Navigate to the directory containing server.js in the product installation path (e.g., C:\ccr_64\frontend). * Copy the script file ControllerWebUIService_11_X_Patch.ps1 into this directory. * Right-click on the ControllerWebUIService_11_X_Patch.ps1 script and select Run with PowerShell to execute it. * After execution, verify that a new System Environment Variable named session_passphrase has been created and assigned a random value. * Confirm that all SSL configuration steps have already been completed if you have enabled SSL. * Restart the IBM Controller Web UI service. Notes * This script is intended for one-time use only. Do not re-run the script. * If any errors occur during execution of the ControllerWebUIService_11_X_Patch.ps1 script, you may run the rollback script ControllerWebUIService_11_X_Patch_Rollback.ps1 or replace server.js with the backed-up file. * Do not delete the session_passphrase environment variable. * After each Fix Pack (FP) upgrade, re-execute the patch script only if the session_passphrase is missing from the server.js file.
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7246015 |
![]() ![]() |
Fri, 26 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM Cognos Controller 11.0.0 through 11.0.1, and IBM Controller 11.1.0 through 11.1.1 could allow an attacker to obtain sensitive information due to the use of hardcoded cryptographic keys for signing session cookies. | |
Title | IBM Controller information disclosure | |
First Time appeared |
Ibm
Ibm cognos Controller Ibm controller |
|
Weaknesses | CWE-321 | |
CPEs | cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:controller:11.1.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Ibm
Ibm cognos Controller Ibm controller |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-09-26T14:54:41.385Z
Reserved: 2025-04-15T21:16:51.462Z
Link: CVE-2025-36326

Updated: 2025-09-26T14:54:21.348Z

Status : Received
Published: 2025-09-26T15:16:03.437
Modified: 2025-09-26T15:16:03.437
Link: CVE-2025-36326

No data.

No data.