CVE-2025-36159
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-20

Last updated on: 2025-11-21

Assigner: IBM Corporation

Description
IBM Concert 1.0.0 through 2.0.0 could allow a local user to forge log files to impersonate other users or hide their identity due to improper neutralization of output.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-20
Last Modified
2025-11-21
Generated
2026-05-07
AI Q&A
2025-11-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ibm concert From 1.0.0 (inc) to 2.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-117 The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in IBM Concert versions 1.0.0 through 2.0.0 allows a local user to forge log files. This means the user can manipulate log entries to impersonate other users or conceal their own identity because the software does not properly neutralize output before logging.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing a local attacker to alter log files, which can lead to impersonation of other users or hiding malicious activities. This undermines the integrity of audit logs, making it difficult to detect unauthorized actions or trace accountability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart