Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14115: CWE-798 Use of Hard-coded Credentials in IBM Sterling Connect:Direct for UNIX Container

0
High
VulnerabilityCVE-2025-14115cvecve-2025-14115cwe-798
Published: Tue Jan 20 2026 (01/20/2026, 14:59:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Direct for UNIX Container

Description

IBM Sterling Connect:Direct for UNIX Container 6.3.0.0 through 6.3.0.6 Interim Fix 016, and 6.4.0.0 through 6.4.0.3 Interim Fix 019 IBM® Sterling Connect:Direct for UNIX contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:12:24 UTC

Technical Analysis

CVE-2025-14115 identifies a critical security vulnerability in IBM Sterling Connect:Direct for UNIX Container, specifically versions 6.3.0.0 through 6.3.0.6 Interim Fix 016 and 6.4.0.0 through 6.4.0.3 Interim Fix 019. The vulnerability stems from the presence of hard-coded credentials within the software. These credentials may include passwords or cryptographic keys used for the product’s inbound authentication mechanisms, outbound communications with external components, or encryption of internal data. Hard-coded credentials represent a significant security risk because they are embedded directly in the code and cannot be changed by administrators, making them a prime target for attackers who gain access to the system. The CVSS v3.1 base score of 8.4 reflects the vulnerability’s high impact on confidentiality, integrity, and availability, with low attack complexity and no requirement for privileges or user interaction. An attacker with local access could exploit these credentials to bypass authentication controls, intercept or manipulate data transfers, or disrupt service availability. While no public exploits have been observed, the vulnerability’s nature and the critical role of Sterling Connect:Direct in secure file transfer environments elevate the threat level. The vulnerability is cataloged under CWE-798, which covers the use of hard-coded credentials, a well-known and dangerous security anti-pattern. The lack of available patches at the time of publication necessitates immediate attention to alternative mitigation strategies.

Potential Impact

The impact of CVE-2025-14115 on organizations worldwide can be severe. IBM Sterling Connect:Direct is widely used in industries such as finance, healthcare, manufacturing, and government for secure, reliable, and automated file transfers. Exploitation of hard-coded credentials could allow attackers to gain unauthorized access to sensitive data, including personally identifiable information (PII), intellectual property, and financial records. This could lead to data breaches, regulatory non-compliance, and significant reputational damage. Attackers might also manipulate or disrupt file transfer operations, causing operational downtime and impacting business continuity. Because the vulnerability does not require authentication or user interaction, it lowers the barrier for exploitation by malicious insiders or attackers who have gained limited system access. The confidentiality, integrity, and availability of critical data flows are all at risk, potentially enabling further lateral movement within networks or facilitating advanced persistent threats (APTs). The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the vulnerability’s high severity and potential for impactful attacks.

Mitigation Recommendations

To mitigate CVE-2025-14115, organizations should first verify if they are running affected versions of IBM Sterling Connect:Direct for UNIX Container (6.3.0.0 through 6.3.0.6 Interim Fix 016 or 6.4.0.0 through 6.4.0.3 Interim Fix 019). Since no official patches are currently available, immediate steps include: 1) Restricting access to systems running the vulnerable software to trusted administrators and minimizing local access to reduce the risk of credential extraction. 2) Implementing network segmentation and strict firewall rules to limit inbound and outbound communications to only necessary endpoints, thereby reducing the attack surface. 3) Monitoring logs and network traffic for unusual authentication attempts or communication patterns that could indicate exploitation attempts. 4) Employing application-layer encryption and additional authentication mechanisms external to the vulnerable software to protect sensitive data flows. 5) Planning for rapid deployment of vendor patches or updates once released, including testing in controlled environments to ensure compatibility. 6) Conducting regular security audits and credential management reviews to detect and remediate any unauthorized use of hard-coded credentials. 7) Considering deployment of host-based intrusion detection systems (HIDS) to alert on suspicious activities related to the vulnerable components. These measures, combined with heightened awareness and incident response preparedness, will help mitigate the risk until a permanent fix is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-05T15:14:31.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fa7e44623b1157c3d36ba

Added to database: 1/20/2026, 4:05:56 PM

Last enriched: 2/27/2026, 8:12:24 AM

Last updated: 3/24/2026, 6:22:16 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses