CVE-2025-36373 Overview
IBM DataPower Gateway contains an information disclosure vulnerability that could allow an administrative user to access sensitive system information from other domains. This cross-domain information leakage affects multiple versions of IBM DataPower Gateway across the 10.5.0, 10.6.0, and 10.6CD product lines.
Critical Impact
Administrative users may gain unauthorized access to sensitive system information belonging to other domains, potentially compromising data isolation between tenants or organizational units.
Affected Products
- IBM DataPower Gateway 10.6CD versions 10.6.1.0 through 10.6.5.0
- IBM DataPower Gateway 10.5.0 versions 10.5.0.0 through 10.5.0.20
- IBM DataPower Gateway 10.6.0 versions 10.6.0.0 through 10.6.0.8
Discovery Timeline
- April 1, 2026 - CVE-2025-36373 published to NVD
- April 1, 2026 - Last updated in NVD database
Technical Details for CVE-2025-36373
Vulnerability Analysis
This vulnerability is classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere). The flaw exists in how IBM DataPower Gateway handles domain isolation for administrative users, allowing information intended for one domain to be exposed to administrators of different domains.
The network-accessible nature of this vulnerability means an authenticated administrative user can exploit it remotely without requiring user interaction. While the vulnerability requires high privileges (administrative access) to exploit, it has a changed scope impact, meaning the vulnerable component can affect resources beyond its security scope.
Root Cause
The root cause stems from improper information exposure controls within the IBM DataPower Gateway's multi-domain architecture. The system fails to properly enforce domain boundaries when presenting system information to administrative users, resulting in cross-domain information leakage.
Attack Vector
The attack requires an authenticated administrative user with network access to the IBM DataPower Gateway. The attacker leverages their administrative privileges to access system information that should be isolated to other domains within the same DataPower Gateway deployment.
The vulnerability manifests in the domain isolation mechanisms of the administrative interface. An administrative user in one domain can view sensitive system information belonging to other configured domains, breaking the expected security boundaries. For detailed technical information, see the IBM Support Page.
Detection Methods for CVE-2025-36373
Indicators of Compromise
- Unusual administrative access patterns showing queries for information outside the user's assigned domain
- Audit logs indicating administrative users accessing system information for domains they do not manage
- Anomalous API calls or administrative interface activity requesting cross-domain resources
Detection Strategies
- Enable comprehensive audit logging for all administrative actions on IBM DataPower Gateway
- Monitor for administrative sessions that access resources or information from multiple domains
- Implement alerting on administrative queries that reference domain identifiers outside the user's scope
- Review access control configurations to identify administrators with overly broad permissions
Monitoring Recommendations
- Configure SIEM rules to correlate administrative access events across domain boundaries
- Establish baseline administrative behavior patterns and alert on deviations
- Regularly audit administrative user domain assignments and access patterns
- Monitor for bulk information retrieval operations by administrative accounts
How to Mitigate CVE-2025-36373
Immediate Actions Required
- Review the IBM Support Page for official patch information
- Audit current administrative user assignments to ensure principle of least privilege
- Review and restrict administrative access to only necessary domains
- Enable enhanced audit logging to track administrative activities across all domains
Patch Information
IBM has released information regarding this vulnerability. Administrators should consult the IBM Support Page for specific patch versions and installation instructions for their affected IBM DataPower Gateway deployments.
Affected versions requiring updates:
- IBM DataPower Gateway 10.6CD: versions 10.6.1.0 through 10.6.5.0
- IBM DataPower Gateway 10.5.0: versions 10.5.0.0 through 10.5.0.20
- IBM DataPower Gateway 10.6.0: versions 10.6.0.0 through 10.6.0.8
Workarounds
- Implement strict domain separation by limiting administrative users to single-domain access where possible
- Apply network segmentation to restrict administrative access pathways to the DataPower Gateway
- Conduct regular access reviews to identify and remediate excessive administrative privileges
- Consider implementing additional access controls or proxies for administrative interfaces until patches can be applied
Until patching is complete, organizations should review their administrative access policies and ensure that domain administrators only have access to the domains they legitimately need to manage. Enhanced monitoring should be implemented to detect any potential exploitation attempts.
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


