Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13723: CWE-324 Use of a Key Past its Expiration Date in IBM Sterling Partner Engagement Manager

0
Medium
VulnerabilityCVE-2025-13723cvecve-2025-13723cwe-324
Published: Fri Mar 13 2026 (03/13/2026, 18:32:45 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Partner Engagement Manager

Description

IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive user information using an expired access token

AI-Powered Analysis

AILast updated: 03/13/2026, 18:48:43 UTC

Technical Analysis

CVE-2025-13723 identifies a vulnerability in IBM Sterling Partner Engagement Manager versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2, where the system improperly uses access tokens beyond their expiration date. This flaw is classified under CWE-324, which pertains to the use of cryptographic keys or tokens past their valid lifetime. The vulnerability allows an unauthenticated attacker to remotely exploit the system by presenting expired access tokens, which the application erroneously accepts, thereby granting access to sensitive user information. The issue arises due to insufficient validation logic that fails to reject expired tokens, undermining the intended security controls. The CVSS v3.1 base score is 5.3, indicating a medium severity with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, affecting confidentiality only. No integrity or availability impact is noted. No patches have been linked yet, and no active exploits are reported in the wild. The vulnerability affects critical business-to-business integration platforms used for partner engagement and supply chain management, potentially exposing sensitive transactional or user data if exploited.

Potential Impact

The primary impact of CVE-2025-13723 is the unauthorized disclosure of sensitive user information due to acceptance of expired access tokens. This compromises confidentiality but does not affect data integrity or system availability. Organizations relying on IBM Sterling Partner Engagement Manager for partner communications and supply chain operations risk exposure of sensitive credentials, business data, or personally identifiable information. Such exposure could facilitate further attacks, including social engineering or targeted intrusions. The ease of exploitation—requiring no authentication or user interaction—raises the risk of automated or opportunistic attacks. While no active exploits are known, the vulnerability could be leveraged by attackers to gain footholds or gather intelligence on business partners. The impact is particularly significant for enterprises with complex partner ecosystems and regulatory requirements for data protection, potentially leading to compliance violations and reputational damage.

Mitigation Recommendations

Organizations should monitor IBM's official channels for patches addressing CVE-2025-13723 and apply them promptly once released. In the interim, administrators should audit and tighten token validation mechanisms, ensuring that expired tokens are strictly rejected. Implement additional layers of security such as token revocation lists, shortened token lifetimes, and enhanced logging to detect anomalous token usage. Network-level controls like IP whitelisting and rate limiting can reduce exposure to remote exploitation. Conduct thorough reviews of partner engagement workflows to identify and remediate any reliance on stale tokens. Employ anomaly detection systems to flag unusual access patterns indicative of expired token misuse. Educate staff and partners about the risks associated with token management and enforce strict credential hygiene. Finally, consider deploying web application firewalls (WAFs) with custom rules to block requests containing expired tokens until patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-25T22:23:37.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b45b242f860ef94386c257

Added to database: 3/13/2026, 6:44:52 PM

Last enriched: 3/13/2026, 6:48:43 PM

Last updated: 3/14/2026, 2:33:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses