Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13212: CWE-799 Improper Control of Interaction Frequency in IBM Aspera Console

0
Medium
VulnerabilityCVE-2025-13212cvecve-2025-13212cwe-799
Published: Fri Mar 13 2026 (03/13/2026, 19:54:10 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Aspera Console

Description

IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to cause a denial of service in the email service due to improper control of interaction frequency.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:38:00 UTC

Technical Analysis

CVE-2025-13212 identifies a vulnerability in IBM Aspera Console versions 3.3.0 through 3.4.8, specifically related to CWE-799: Improper Control of Interaction Frequency. This flaw allows an authenticated user to repeatedly trigger interactions with the email service component of the console without adequate rate limiting or throttling controls. As a result, the email service can be overwhelmed, leading to a denial of service condition where legitimate email notifications may be delayed or dropped entirely. The vulnerability is exploitable remotely over the network without requiring additional user interaction beyond authentication, making it a concern for environments where multiple authenticated users exist. The CVSS v3.1 base score of 5.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), and impact limited to availability (A:L). Although no public exploits have been reported, the vulnerability could be leveraged in targeted attacks to disrupt operational workflows dependent on email notifications within IBM Aspera Console. The lack of patch links suggests that remediation may require vendor intervention or configuration changes to limit interaction frequency.

Potential Impact

The primary impact of CVE-2025-13212 is a denial of service condition affecting the email service within IBM Aspera Console. This can disrupt automated email notifications critical for operational awareness, alerting, and workflow management in organizations relying on Aspera Console for secure file transfers. The availability degradation could lead to delayed responses to important events, impacting business continuity and operational efficiency. Since the vulnerability requires authentication, the risk is somewhat mitigated by access controls, but insider threats or compromised credentials could still exploit this flaw. The vulnerability does not affect confidentiality or data integrity, so data breaches or unauthorized data modification are not concerns here. Organizations with high dependency on Aspera Console’s email notifications, especially in sectors like finance, healthcare, media, and government, may experience operational disruptions if exploited.

Mitigation Recommendations

To mitigate CVE-2025-13212, organizations should first verify if they are running affected versions of IBM Aspera Console (3.3.0 through 3.4.8) and prioritize upgrading to a patched version once available from IBM. In the absence of an immediate patch, administrators should implement strict access controls to limit authenticated user accounts to only those necessary, reducing the attack surface. Rate limiting or throttling mechanisms should be applied at the application or network level to restrict the frequency of email service interactions per user. Monitoring and alerting on unusual spikes in email service requests can help detect exploitation attempts early. Additionally, enforcing strong authentication methods and regularly auditing user activities can prevent misuse by compromised accounts. Network segmentation and firewall rules can restrict access to the console’s email service endpoints to trusted users and systems only. Engaging with IBM support for any recommended configuration changes or interim fixes is also advised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-14T19:05:22.749Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b473bd2f860ef943aa93fc

Added to database: 3/13/2026, 8:29:49 PM

Last enriched: 3/21/2026, 12:38:00 AM

Last updated: 4/29/2026, 12:31:31 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses