IBM has released a high-severity security advisory for vulnerability CVE-2025-36386 (CVSS 9.8) in IBM Maximo Manage, a central part of the IBM Maximo Application Suite (MAS). The vulnerability allows a remote attacker to bypass authentication controls and achieve unauthorized access to Cognos Analytics, putting sensitive enterprise data at risk. As per IBM, the issue arises when Maximo Manage is being integrated with independent Cognos Analytics through the MXCSP (Maximo Cognos Service Provider) integration method. Misconfiguration or exploitation of MXCSP can enable attackers to bypass regular authentication procedures and attack the Cognos service layer directly with no valid credentials. The problem is present in multiple versions of Maximo Manage in MAS, namely MAS 9.0.0 to 9.0.15 (Manage 9.0.0 to 9.0.17) and MAS 9.1.0 to 9.1.4 (Manage 9.1.0 to 9.1.4). Due to its remote exploitability and ability to expose data, IBM has given the flaw its highest severity level. An attack that is successful could enable unauthorized individuals to view and alter Cognos dashboards and reports, obtain or change sensitive analytics information, and potentially elevate privileges in the interlinked Maximo environments. Since Cognos Analytics is frequently used with enterprise-wide applications like ERP, supply chain, and maintenance intelligence systems, the scope of the vulnerability's impact is much wider than that of Maximo alone. Hackers' access to analytics capabilities could grant them visibility into important business operations data, and thus the problem is especially perilous for industrial, manufacturing, and asset management firms where Maximo is extensively used. To correct the problem, IBM has issued immediate patch releases for both key MAS branches: the MAS 9.0 Fix Central Update and the MAS 9.1 Fix Central Update. The firm is strongly recommending all impacted customers to install the newest patches as soon as possible to harden their environments and avoid possible exploitation.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...