Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36064: CWE-307 Improper Restriction of Excessive Authentication Attempts in IBM Sterling Connect:Express for Microsoft Windows

0
Medium
VulnerabilityCVE-2025-36064cvecve-2025-36064cwe-307
Published: Mon Sep 22 2025 (09/22/2025, 18:25:38 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Express for Microsoft Windows

Description

IBM Sterling Connect:Express for Microsoft Windows 3.1.0.0 through 3.1.0.22 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 18:51:09 UTC

Technical Analysis

CVE-2025-36064 identifies a security vulnerability in IBM Sterling Connect:Express for Microsoft Windows versions 3.1.0.0 through 3.1.0.22. The root cause is an inadequate account lockout mechanism that fails to sufficiently restrict the number of consecutive failed authentication attempts. This weakness falls under CWE-307, which concerns improper restriction of excessive authentication attempts. Due to this flaw, a remote attacker can attempt to brute force user credentials without triggering effective lockout or throttling, increasing the likelihood of credential compromise. The vulnerability requires no privileges or user interaction, but the attack complexity is rated high, indicating some difficulty in successful exploitation. The CVSS v3.1 base score is 5.9 (medium), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N, reflecting network attack vector, high complexity, no privileges or user interaction needed, unchanged scope, and high impact on confidentiality only. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The vulnerability primarily threatens confidentiality by enabling unauthorized access through credential brute forcing, but does not directly impact system integrity or availability. IBM Sterling Connect:Express is widely used in enterprise file transfer scenarios, especially in supply chain and financial sectors, making this vulnerability a concern for organizations relying on secure file exchanges.

Potential Impact

The primary impact of CVE-2025-36064 is the potential compromise of user credentials through brute force attacks, which can lead to unauthorized access to IBM Sterling Connect:Express systems. This unauthorized access could expose sensitive data transferred via the platform, undermining confidentiality. While the vulnerability does not affect system integrity or availability directly, compromised credentials could be leveraged for further lateral movement or data exfiltration within an organization. Enterprises using affected versions in critical sectors such as finance, supply chain management, and logistics could face significant operational and reputational risks if attackers gain access. The lack of effective account lockout increases the attack surface for remote adversaries, especially those targeting high-value accounts. Although no known exploits are currently reported, the medium severity and ease of network access make this a credible threat that requires timely attention to prevent potential breaches.

Mitigation Recommendations

Organizations should implement several specific mitigations to reduce the risk posed by CVE-2025-36064. First, enforce strict account lockout policies or throttling mechanisms at the application or network level to limit failed authentication attempts, even if the product's native lockout is inadequate. Deploy multi-factor authentication (MFA) for all user accounts accessing Sterling Connect:Express to add an additional layer of defense against credential compromise. Monitor authentication logs closely for unusual patterns indicative of brute force attempts and set up alerts for rapid failed login attempts. Network segmentation and firewall rules should restrict access to the Sterling Connect:Express service to trusted IP addresses and networks only. Until IBM releases an official patch, consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with rules to detect and block brute force attack patterns targeting the service. Finally, educate users on strong password policies and regularly review account privileges to minimize the impact of any compromised credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:12.197Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d197d505d26ef415250836

Added to database: 9/22/2025, 6:39:17 PM

Last enriched: 3/14/2026, 6:51:09 PM

Last updated: 3/26/2026, 8:49:18 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses