IBM Cognos Controller 11.0.0 through 11.0.1, and IBM Controller 11.1.0 through 11.1.1 could allow an attacker to obtain sensitive information due to the use of hardcoded cryptographic keys for signing session cookies.
Fixes

Solution

No solution given by the vendor.


Workaround

Download the script from here: Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes   It is strongly recommended that you apply the most recent security updates:     Affected Product(s)Version(s)Interim FixIBM Controller11.1.0 - 11.1.1 Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes IBM Cognos Controller11.0.0 - 11.0.1 Fix Central https://www.ibm.com/support/fixcentral/swg/selectFixes Prerequisites * Ensure you are logged in to the server with System Administrator privileges. * Create a backup of the server.js file located in the product installation path (e.g., C:\ccr_64\frontend) before proceeding. Procedure * Navigate to the directory containing server.js in the product installation path (e.g., C:\ccr_64\frontend). * Copy the script file ControllerWebUIService_11_X_Patch.ps1 into this directory. * Right-click on the ControllerWebUIService_11_X_Patch.ps1 script and select Run with PowerShell to execute it. * After execution, verify that a new System Environment Variable named session_passphrase has been created and assigned a random value. * Confirm that all SSL configuration steps have already been completed if you have enabled SSL. * Restart the IBM Controller Web UI service. Notes * This script is intended for one-time use only. Do not re-run the script. * If any errors occur during execution of the ControllerWebUIService_11_X_Patch.ps1 script, you may run the rollback script ControllerWebUIService_11_X_Patch_Rollback.ps1 or   replace server.js with the backed-up file. * Do not delete the session_passphrase environment variable. * After each Fix Pack (FP) upgrade, re-execute the patch script only if the session_passphrase is missing from the server.js file.

History

Fri, 26 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 14:45:00 +0000

Type Values Removed Values Added
Description IBM Cognos Controller 11.0.0 through 11.0.1, and IBM Controller 11.1.0 through 11.1.1 could allow an attacker to obtain sensitive information due to the use of hardcoded cryptographic keys for signing session cookies.
Title IBM Controller information disclosure
First Time appeared Ibm
Ibm cognos Controller
Ibm controller
Weaknesses CWE-321
CPEs cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:controller:11.1.1:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm cognos Controller
Ibm controller
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2025-09-26T14:54:41.385Z

Reserved: 2025-04-15T21:16:51.462Z

Link: CVE-2025-36326

cve-icon Vulnrichment

Updated: 2025-09-26T14:54:21.348Z

cve-icon NVD

Status : Received

Published: 2025-09-26T15:16:03.437

Modified: 2025-09-26T15:16:03.437

Link: CVE-2025-36326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.