The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-36105

CVE-2025-36105: IBM Planning Analytics Info Disclosure

CVE-2025-36105 is an information disclosure vulnerability in IBM Planning Analytics Advanced Certified Containers that allows privileged users to access sensitive environment variables. This article covers technical details, impact, and fixes.

Published: March 13, 2026

CVE-2025-36105 Overview

CVE-2025-36105 is an information disclosure vulnerability affecting IBM Planning Analytics Advanced Certified Containers versions 3.1.0 through 3.1.4. This vulnerability allows a local privileged user to obtain sensitive information from environment variables, potentially exposing credentials, API keys, or other confidential configuration data stored within containerized deployments.

Critical Impact

Local privileged attackers can extract sensitive information from environment variables in containerized IBM Planning Analytics deployments, potentially leading to credential theft and lateral movement within enterprise environments.

Affected Products

  • IBM Planning Analytics Advanced Certified Containers 3.1.0
  • IBM Planning Analytics Advanced Certified Containers 3.1.1 through 3.1.3
  • IBM Planning Analytics Advanced Certified Containers 3.1.4

Discovery Timeline

  • 2026-03-10 - CVE-2025-36105 published to NVD
  • 2026-03-11 - Last updated in NVD database

Technical Details for CVE-2025-36105

Vulnerability Analysis

This vulnerability is classified under CWE-526 (Cleartext Storage of Sensitive Information in an Environment Variable). The flaw exists because sensitive information is stored in environment variables within the containerized application without adequate protection. When a privileged local user gains access to the container or the host system, they can enumerate and read these environment variables to extract sensitive data.

The attack requires local access and high privileges, meaning the attacker must already have elevated access to the system or container environment. However, once this access is obtained, the confidentiality impact is significant as the attacker can retrieve sensitive configuration data that may include database credentials, API tokens, encryption keys, or other secrets commonly stored in environment variables within containerized deployments.

Root Cause

The root cause of this vulnerability is the improper handling of sensitive information within IBM Planning Analytics Advanced Certified Containers. The application stores sensitive configuration data in cleartext environment variables, which can be accessed by any user with sufficient privileges on the container or host system. This violates the principle of least privilege and secure secrets management best practices, where sensitive data should be stored in encrypted secret stores or secure vaults rather than environment variables.

Attack Vector

The attack vector is local, requiring the adversary to have privileged access to the affected system. An attacker with local administrative or root-level access to the container host or the container itself can execute commands to list and read environment variables. Common methods include using commands such as printenv, env, or reading from /proc/[pid]/environ on Linux systems. In Kubernetes environments, attackers with appropriate RBAC permissions could also retrieve secrets mounted as environment variables through the API.

The exploitation does not require user interaction and can be performed with low complexity once the prerequisite access is obtained. While the attack does not directly impact system integrity or availability, the high confidentiality impact means that exposed credentials could enable further attacks, including privilege escalation or lateral movement to other systems.

Detection Methods for CVE-2025-36105

Indicators of Compromise

  • Unusual enumeration of environment variables by privileged users or processes
  • Unexpected access to /proc/*/environ files on container hosts
  • Anomalous kubectl commands querying secrets or pod environment configurations
  • Access logs showing environment variable retrieval outside normal application behavior

Detection Strategies

  • Monitor for commands that enumerate environment variables such as printenv, env, or set executed by users other than application service accounts
  • Implement audit logging on container runtimes to track process execution and environment access
  • Deploy runtime security tools that detect suspicious activity within containers, including secrets enumeration
  • Review Kubernetes audit logs for unauthorized access to secrets or pod specifications

Monitoring Recommendations

  • Enable comprehensive audit logging on container orchestration platforms
  • Configure alerts for privileged access to sensitive namespaces or pods containing IBM Planning Analytics
  • Implement file integrity monitoring on container images and runtime environments
  • Regularly review access logs for anomalous patterns indicating potential reconnaissance activity

How to Mitigate CVE-2025-36105

Immediate Actions Required

  • Upgrade IBM Planning Analytics Advanced Certified Containers to the latest patched version as specified by IBM
  • Review and audit current environment variable configurations for sensitive data exposure
  • Migrate sensitive credentials from environment variables to secure secret management solutions
  • Restrict privileged access to container hosts and minimize users with elevated permissions

Patch Information

IBM has released security guidance for this vulnerability. Administrators should consult the IBM Support Page for detailed patch information and upgrade instructions. Apply the recommended updates to all affected IBM Planning Analytics Advanced Certified Containers deployments running versions 3.1.0 through 3.1.4.

Workarounds

  • Implement Kubernetes Secrets or external secret management solutions (HashiCorp Vault, AWS Secrets Manager) instead of environment variables for sensitive data
  • Apply strict RBAC policies to limit which users and service accounts can access pod specifications and secrets
  • Use pod security policies or admission controllers to restrict privileged container access
  • Isolate IBM Planning Analytics containers in dedicated namespaces with enhanced security controls

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechIbm Planning Analytics

  • SeverityMEDIUM

  • CVSS Score4.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-526
  • Technical References
  • IBM Support Page
  • Related CVEs
  • CVE-2025-14806: IBM Planning Analytics Local Vulnerability

  • CVE-2026-1267: IBM Planning Analytics Auth Bypass Flaw

  • CVE-2025-36357: IBM Planning Analytics Path Traversal
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English