Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14115: CWE-798 Use of Hard-coded Credentials in IBM Sterling Connect:Direct for UNIX Container

0
High
VulnerabilityCVE-2025-14115cvecve-2025-14115cwe-798
Published: Tue Jan 20 2026 (01/20/2026, 14:59:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Direct for UNIX Container

Description

CVE-2025-14115 is a high-severity vulnerability in IBM Sterling Connect:Direct for UNIX Container versions 6. 3. 0. 0 through 6. 3. 0. 6 Interim Fix 016 and 6. 4. 0. 0 through 6.

AI-Powered Analysis

AILast updated: 01/20/2026, 16:20:18 UTC

Technical Analysis

CVE-2025-14115 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within IBM Sterling Connect:Direct for UNIX Container software versions 6.3.0.0 through 6.3.0.6 Interim Fix 016 and 6.4.0.0 through 6.4.0.3 Interim Fix 019. The software embeds fixed passwords or cryptographic keys that it uses internally for authenticating inbound connections, communicating with external components, or encrypting internal data. Because these credentials are hard-coded, they cannot be changed or revoked easily, creating a persistent attack vector. An attacker with local access to the system could extract these credentials and use them to impersonate legitimate components, decrypt sensitive data, or intercept and manipulate communications. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 8.4 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no exploits have been reported in the wild, the presence of hard-coded credentials in critical enterprise software used for secure file transfers poses a significant risk. The vulnerability affects UNIX containerized deployments of IBM Sterling Connect:Direct, a widely used managed file transfer solution in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of sensitive data transmitted via IBM Sterling Connect:Direct for UNIX Container. The hard-coded credentials could allow attackers to gain unauthorized access to secure file transfer sessions, decrypt confidential files, or disrupt data flows, potentially causing data breaches or operational outages. Industries such as banking, insurance, manufacturing, and government agencies that rely heavily on secure and compliant file transfer mechanisms are particularly vulnerable. The compromise of these credentials could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, disruption of critical data exchanges could impact supply chains and financial transactions. The vulnerability's exploitation could also facilitate lateral movement within networks, escalating the threat to broader IT infrastructure.

Mitigation Recommendations

1. Monitor IBM's official channels for patches or interim fixes addressing CVE-2025-14115 and apply them promptly once released. 2. Until patches are available, restrict local access to systems running affected versions of Sterling Connect:Direct UNIX Container to trusted administrators only. 3. Implement strict network segmentation and firewall rules to limit inbound and outbound communications from these containers to only necessary endpoints. 4. Conduct regular audits of system configurations and logs to detect unauthorized access attempts or anomalous activities related to file transfer processes. 5. Where possible, replace or supplement hard-coded credentials with dynamic, centrally managed secrets using secure vault solutions. 6. Employ encryption at rest and in transit with keys managed outside the vulnerable software to reduce reliance on embedded credentials. 7. Train IT and security staff to recognize signs of credential compromise and respond swiftly. 8. Consider additional compensating controls such as multi-factor authentication for administrative access and enhanced endpoint detection and response (EDR) capabilities on hosts running the affected software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-05T15:14:31.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fa7e44623b1157c3d36ba

Added to database: 1/20/2026, 4:05:56 PM

Last enriched: 1/20/2026, 4:20:18 PM

Last updated: 1/20/2026, 6:31:59 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats