Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13718: CWE-319 Cleartext Transmission of Sensitive Information in IBM Sterling Partner Engagement Manager

0
Low
VulnerabilityCVE-2025-13718cvecve-2025-13718cwe-319
Published: Fri Mar 13 2026 (03/13/2026, 18:33:07 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Partner Engagement Manager

Description

IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors.

AI-Powered Analysis

AILast updated: 03/13/2026, 18:48:18 UTC

Technical Analysis

CVE-2025-13718 is a security vulnerability identified in IBM Sterling Partner Engagement Manager versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2. The vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive information. Specifically, the affected versions transmit sensitive data over communication channels without adequate encryption, allowing remote attackers with network access to intercept and obtain this information by sniffing the traffic. The vulnerability does not require any authentication or user interaction, increasing the risk of exposure in environments where network traffic is not adequately protected. The CVSS v3.1 base score is 3.7, reflecting a low severity primarily due to the limited confidentiality impact and no effect on integrity or availability. The attack vector is network-based with high attack complexity, meaning that while an attacker must have access to the network path, no privileges or user actions are needed. No public exploits or active exploitation in the wild have been reported to date. The vulnerability affects enterprise environments using IBM Sterling Partner Engagement Manager for partner engagement and supply chain collaboration, where sensitive business data might be transmitted. The lack of encryption or use of weak encryption protocols in these versions is the root cause, emphasizing the need for secure communication protocols such as TLS. IBM has not yet published patches or fixes, so mitigation currently relies on configuration changes and network security controls.

Potential Impact

The primary impact of CVE-2025-13718 is the potential unauthorized disclosure of sensitive information transmitted by IBM Sterling Partner Engagement Manager. Organizations using affected versions may have confidential business data, partner credentials, or transaction details exposed to attackers capable of intercepting network traffic. This could lead to information leakage, loss of competitive advantage, or exposure of sensitive partner information. However, the vulnerability does not affect the integrity or availability of the system, so it does not enable attackers to modify data or disrupt services. The risk is higher in environments with untrusted or poorly segmented networks, such as public or shared networks, or where internal network monitoring is insufficient. Since no authentication or user interaction is required, attackers positioned on the network path can exploit this vulnerability relatively easily if they have access. The overall impact is limited by the requirement for network access and the low severity score, but organizations with high confidentiality requirements or regulatory obligations should treat this as a significant risk to data privacy.

Mitigation Recommendations

To mitigate CVE-2025-13718, organizations should immediately assess their deployment of IBM Sterling Partner Engagement Manager and identify affected versions. The most effective mitigation is to upgrade to a fixed version once IBM releases patches addressing this vulnerability. In the interim, organizations should enforce the use of strong encryption protocols such as TLS 1.2 or higher for all communication channels involving Sterling Partner Engagement Manager to prevent cleartext transmission. Network segmentation and isolation of systems running the affected software can reduce exposure to unauthorized sniffing. Deploying network-level protections such as encrypted VPN tunnels or IPsec can further secure data in transit. Monitoring network traffic for unusual sniffing or man-in-the-middle activities is advisable. Additionally, reviewing and hardening configuration settings related to communication protocols in Sterling Partner Engagement Manager can help ensure encryption is enabled. Organizations should also educate network administrators and security teams about this vulnerability to maintain vigilance until patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-25T22:03:39.987Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b45b242f860ef94386c254

Added to database: 3/13/2026, 6:44:52 PM

Last enriched: 3/13/2026, 6:48:18 PM

Last updated: 3/14/2026, 12:34:53 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses