Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14483: CWE-201 Insertion of Sensitive Information Into Sent Data in IBM Sterling B2B Integrator

0
Medium
VulnerabilityCVE-2025-14483cvecve-2025-14483cwe-201
Published: Fri Mar 13 2026 (03/13/2026, 19:15:11 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling B2B Integrator

Description

IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could disclose sensitive host information to authenticated users in responses that could be used in further attacks against the system.

AI-Powered Analysis

AILast updated: 03/13/2026, 19:45:27 UTC

Technical Analysis

CVE-2025-14483 is a vulnerability classified under CWE-201, which concerns the insertion of sensitive information into sent data. Specifically, IBM Sterling B2B Integrator and IBM Sterling File Gateway versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could inadvertently disclose sensitive host information within responses sent to authenticated users. This sensitive information disclosure does not require user interaction but does require the attacker to have valid credentials with some level of privileges. The disclosed data could include internal host details that may facilitate further targeted attacks, such as privilege escalation or lateral movement within the network. The vulnerability has a CVSS 3.1 base score of 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning it is remotely exploitable over the network with low attack complexity, requires privileges, no user interaction, and impacts confidentiality only. No patches or exploits are currently publicly available, but the risk lies in potential reconnaissance and information gathering by malicious actors with access.

Potential Impact

The primary impact of CVE-2025-14483 is the unauthorized disclosure of sensitive host information to authenticated users. This can aid attackers in mapping the internal network, identifying system configurations, or discovering vulnerabilities that can be exploited for privilege escalation or lateral movement. While the vulnerability does not directly affect system integrity or availability, the information leakage can significantly increase the risk of more severe attacks. Organizations relying on IBM Sterling B2B Integrator for critical business-to-business transactions may face increased risk of data breaches or operational disruptions if attackers leverage this information. The requirement for authenticated access limits exposure to insider threats or compromised accounts, but given the critical role of Sterling B2B Integrator in supply chain and partner integrations, the impact on confidentiality is notable.

Mitigation Recommendations

1. Apply patches or updates from IBM as soon as they become available for the affected Sterling B2B Integrator and File Gateway versions. 2. Restrict access to the Sterling B2B Integrator environment strictly to trusted and necessary personnel, enforcing the principle of least privilege to minimize the number of users with authenticated access. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Monitor and audit user activities within the Sterling environment to detect unusual access patterns or attempts to extract sensitive information. 5. Use network segmentation and firewall rules to limit exposure of the Sterling B2B Integrator servers to only essential network segments and trusted partners. 6. Conduct regular security assessments and penetration testing focused on information disclosure risks within the B2B integration environment. 7. Educate administrators and users about the risks of information disclosure and the importance of safeguarding credentials and access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-10T20:02:45.446Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b465b22f860ef9438da275

Added to database: 3/13/2026, 7:29:54 PM

Last enriched: 3/13/2026, 7:45:27 PM

Last updated: 3/15/2026, 9:28:09 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses