Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console

0
High
VulnerabilityCVE-2025-13379cvecve-2025-13379cwe-89
Published: Thu Feb 05 2026 (02/05/2026, 13:30:04 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Aspera Console

Description

IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:06:24 UTC

Technical Analysis

CVE-2025-13379 identifies a critical SQL injection vulnerability (CWE-89) in IBM Aspera Console versions 3.4.0 through 3.4.8. The vulnerability arises from improper neutralization of special elements in SQL commands, allowing an unauthenticated remote attacker to inject malicious SQL queries directly into the backend database. This injection flaw enables the attacker to perform unauthorized actions such as viewing sensitive data, modifying records, adding new entries, or deleting existing information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score of 8.6 reflects high impact on confidentiality (high), integrity (low), and availability (low), with low attack complexity and no privileges required. IBM Aspera Console is widely used for high-speed file transfer and data management in enterprise environments, making this vulnerability particularly concerning for organizations handling sensitive or regulated data. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation necessitate urgent remediation. The lack of available patches at the time of disclosure underscores the importance of implementing interim mitigations and monitoring for updates from IBM.

Potential Impact

The impact of CVE-2025-13379 is significant for organizations worldwide using IBM Aspera Console in affected versions. Exploitation can lead to unauthorized disclosure of sensitive data, including potentially confidential business information or personally identifiable information (PII), resulting in privacy violations and regulatory non-compliance. Data integrity is compromised as attackers can modify or delete records, potentially disrupting business operations or corrupting critical datasets. Availability may also be affected if attackers delete or alter database content, causing service interruptions or failures. The vulnerability's remote and unauthenticated nature increases the likelihood of exploitation by external threat actors, including cybercriminals and nation-state actors. Organizations in sectors such as finance, healthcare, government, and media—where IBM Aspera Console is commonly deployed—face heightened risks of data breaches, reputational damage, and financial losses. The absence of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.

Mitigation Recommendations

To mitigate CVE-2025-13379, organizations should immediately identify all instances of IBM Aspera Console versions 3.4.0 through 3.4.8 within their environment. Until official patches are released by IBM, implement the following specific measures: 1) Restrict network access to the Aspera Console management interfaces by applying strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. 2) Employ Web Application Firewalls (WAFs) with custom rules designed to detect and block SQL injection patterns targeting the Aspera Console endpoints. 3) Conduct thorough input validation and sanitization on any user-supplied data interacting with the console, if customization is possible. 4) Monitor logs and database activity for unusual queries or access patterns indicative of injection attempts. 5) Prepare for rapid deployment of IBM patches once available and test updates in controlled environments before production rollout. 6) Educate system administrators and security teams about the vulnerability and signs of exploitation to enhance detection and response capabilities. These targeted actions go beyond generic advice by focusing on access control, proactive detection, and readiness for patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-18T20:08:29.272Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69849ef7f9fa50a62f23a791

Added to database: 2/5/2026, 1:45:27 PM

Last enriched: 2/27/2026, 7:06:24 AM

Last updated: 3/24/2026, 12:40:19 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses