Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36002: CWE-260 Password in Configuration File in IBM Sterling B2B Integrator

0
Medium
VulnerabilityCVE-2025-36002cvecve-2025-36002cwe-260
Published: Thu Oct 16 2025 (10/16/2025, 14:54:53 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling B2B Integrator

Description

IBM Sterling B2B Integrator 6.2.0.0 through 6.2.0.5, and 6.2.1.0 and IBM Sterling File Gateway 6.2.0.0 through 6.2.0.5, and 6.2.1.0 stores user credentials in configuration files which can be read by a local user.

AI-Powered Analysis

AILast updated: 10/25/2025, 03:56:06 UTC

Technical Analysis

CVE-2025-36002 identifies a vulnerability in IBM Sterling B2B Integrator and IBM Sterling File Gateway versions 6.2.0.0 through 6.2.0.5 and 6.2.1.0, where user credentials are stored insecurely in configuration files. This vulnerability is categorized under CWE-260 (Use of a One-Way Hash Without a Salt) and CWE-256 (Plaintext Storage of a Password). The core issue is that these configuration files contain sensitive authentication information that can be read by any local user with file system access, potentially exposing passwords in plaintext or weakly protected form. The CVSS v3.1 score is 5.5 (medium severity), reflecting that exploitation requires local access with low privileges (AV:L, PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The vulnerability does not require elevated privileges beyond local user access, making it a concern in environments where local user accounts are shared, poorly controlled, or where attackers have gained foothold through other means. No public exploits have been reported, but the exposure of credentials could facilitate lateral movement or privilege escalation within affected networks. The vulnerability affects critical B2B integration platforms used for secure data exchange and file transfers, which are integral to many enterprise supply chains and partner communications. The lack of available patches at the time of publication necessitates immediate compensating controls to limit local file access and monitor for suspicious activity.

Potential Impact

For European organizations, this vulnerability poses a significant confidentiality risk. Exposure of user credentials stored in configuration files could allow attackers or unauthorized local users to access sensitive B2B communication channels, potentially leading to data leakage or unauthorized data manipulation through compromised accounts. While the vulnerability does not directly affect system integrity or availability, the compromise of credentials can enable further attacks such as lateral movement, privilege escalation, or unauthorized access to partner systems. Industries relying heavily on IBM Sterling products for supply chain management, financial transactions, or regulated data exchange—such as manufacturing, finance, and logistics—may face operational disruptions and compliance risks if credential compromise leads to data breaches. Given the local access requirement, the vulnerability is especially impactful in environments with weak endpoint security, insufficient user account segregation, or inadequate monitoring of internal threats. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop techniques to leverage this vulnerability. European organizations must consider the potential for insider threats or attackers who have already gained limited access to escalate their privileges or move laterally within networks.

Mitigation Recommendations

To mitigate CVE-2025-36002, organizations should first restrict access permissions on configuration files storing credentials to the minimum necessary users and service accounts, ensuring that only trusted administrators and system processes can read these files. Implement strict local user account management policies, including removing unnecessary local accounts and enforcing strong authentication and authorization controls. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local file access or privilege escalation attempts. Where possible, isolate systems running IBM Sterling products in segmented network zones with limited user access. Regularly audit file system permissions and review logs for unauthorized access attempts. IBM should be contacted for patches or configuration updates that eliminate plaintext credential storage or encrypt sensitive configuration data. Until patches are available, consider using application-level encryption or vault solutions to store credentials securely outside of configuration files. Additionally, implement multi-factor authentication (MFA) for administrative access to reduce the risk of credential misuse. Finally, conduct user awareness training to highlight the risks of local credential exposure and enforce policies against unauthorized local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:05.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f108349f8a5dbaeadb9478

Added to database: 10/16/2025, 2:59:00 PM

Last enriched: 10/25/2025, 3:56:06 AM

Last updated: 12/4/2025, 7:50:04 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats