Monday, May 19, 2025
HomeCVE/vulnerabilityIBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

Published on

SIEM as a Service

Follow Us on Google News

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its Cognos Analytics platform.

These flaws, tracked as CVE-2024-40695 (Malicious File Upload) and CVE-2024-51466 (Expression Language Injection), potentially expose enterprise systems to unauthorized file uploads and the risk of sensitive data exposure or denial-of-service attacks.

CVE IDDescriptionSeverityCVSS ScoreAffected Versions
CVE-2024-40695Malicious file upload via improper file validationHigh8.012.0.0–12.0.4, 11.2.0–11.2.4 FP4
CVE-2024-51466Expression Language (EL) Injection allows attackers to expose sensitive information and crash serverCritical9.012.0.0–12.0.4, 11.2.0–11.2.4 FP4

Details of the Vulnerabilities

Malicious File Upload (CVE-2024-40695)

- Advertisement - Google News

This vulnerability arises due to insufficient validation of files uploaded through the Cognos Analytics web interface.

Privileged users can upload files with dangerous or executable content, which, when processed by the platform, may allow attackers to execute malicious code or conduct further attacks against unsuspecting users.

The flaw affects Cognos Analytics versions 12.0.0 to 12.0.4 and 11.2.0 to 11.2.4 FP4. It has a CVSS base score of 8.0, underscoring its high risk.

Expression Language Injection (CVE-2024-51466)

A more severe flaw, this issue enables remote attackers to inject arbitrary Expression Language (EL) statements.

When exploited, it can lead to sensitive data exposure, excessive memory consumption, and server crashes, causing significant disruption. Scored 9.0 on the CVSS scale, this vulnerability is considered critical.

Affected Products and Versions

  • IBM Cognos Analytics 12.0.0 to 12.0.4
  • IBM Cognos Analytics 11.2.0 to 11.2.4 FP4

IBM urges all customers to immediately update their software to the latest patched versions:

ProductVulnerable VersionsFixed Version
Cognos Analytics12.0.0–12.0.412.0.4 Interim Fix 1
Cognos Analytics11.2.0–11.2.4 FP411.2.4 FP5

No temporary workarounds or mitigations are available-applying the vendor patch is the only solution.

Organizations using IBM Cognos Analytics should prioritize these updates to prevent unauthorized access and attack.

The vulnerabilities present a clear risk to the confidentiality, integrity, and availability of analytic systems and their underlying data.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...