CVE-2025-36112: CWE-497 in IBM Sterling B2B Integrator
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.5 and 6.2.1.1 could reveal sensitive server IP configuration information to an unauthorized user.
AI Analysis
Technical Summary
CVE-2025-36112 is a vulnerability identified in IBM Sterling B2B Integrator and IBM Sterling File Gateway affecting multiple versions from 6.0.0.0 up to 6.2.1.1. The flaw is categorized under CWE-497, which pertains to the exposure of sensitive information to unauthorized users. Specifically, the vulnerability allows an unauthenticated remote attacker to retrieve sensitive server IP configuration details. This information disclosure occurs without requiring any privileges or user interaction, making it accessible to any attacker with network access to the affected system. The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but the impact is limited to confidentiality as integrity and availability remain unaffected. The exposure of IP configuration data can assist attackers in mapping internal network topology, identifying critical infrastructure, and planning subsequent attacks such as lateral movement or targeted exploitation of other vulnerabilities. Although no public exploits have been reported yet, the presence of sensitive configuration data leakage represents a significant risk in environments where IBM Sterling B2B Integrator is used for secure business-to-business file transfers and integrations. The vulnerability affects several versions, including 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.5 and 6.2.1.1, highlighting the need for organizations to verify their deployment versions and apply any available patches or mitigations.
Potential Impact
For European organizations, the exposure of sensitive server IP configuration information can have several adverse effects. IBM Sterling B2B Integrator is widely used in sectors such as finance, manufacturing, logistics, and telecommunications, which are critical to European economies. Disclosure of internal IP addresses can facilitate reconnaissance activities by threat actors, enabling them to map network architecture and identify valuable targets for further exploitation. This can increase the risk of subsequent attacks such as lateral movement, privilege escalation, or targeted ransomware campaigns. Additionally, organizations handling sensitive or regulated data under GDPR may face compliance risks if such information disclosure leads to broader data breaches. The medium severity rating suggests that while the vulnerability alone may not cause direct operational disruption, it significantly lowers the barrier for attackers to conduct more damaging intrusions. European companies with complex B2B integrations and supply chain dependencies may be particularly vulnerable, as attackers could leverage disclosed network details to compromise partner systems or intercept sensitive transactions.
Mitigation Recommendations
Organizations should first identify if they are running affected versions of IBM Sterling B2B Integrator or IBM Sterling File Gateway. Since no patch links are currently provided, it is critical to monitor IBM security advisories for official patches or updates addressing CVE-2025-36112. In the interim, network segmentation should be enforced to restrict access to the Sterling B2B Integrator servers, limiting exposure to trusted IP ranges only. Implement strict firewall rules and intrusion detection/prevention systems to monitor and block unauthorized access attempts. Employ network-level encryption and VPNs for all B2B communications to reduce the risk of interception. Regularly audit and review server configurations to ensure sensitive information is not unnecessarily exposed via management interfaces or error messages. Additionally, conduct penetration testing and vulnerability assessments focused on information disclosure vectors. Finally, enhance monitoring for unusual reconnaissance activity that could indicate exploitation attempts leveraging disclosed IP information.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-36112: CWE-497 in IBM Sterling B2B Integrator
Description
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.5 and 6.2.1.1 could reveal sensitive server IP configuration information to an unauthorized user.
AI-Powered Analysis
Technical Analysis
CVE-2025-36112 is a vulnerability identified in IBM Sterling B2B Integrator and IBM Sterling File Gateway affecting multiple versions from 6.0.0.0 up to 6.2.1.1. The flaw is categorized under CWE-497, which pertains to the exposure of sensitive information to unauthorized users. Specifically, the vulnerability allows an unauthenticated remote attacker to retrieve sensitive server IP configuration details. This information disclosure occurs without requiring any privileges or user interaction, making it accessible to any attacker with network access to the affected system. The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but the impact is limited to confidentiality as integrity and availability remain unaffected. The exposure of IP configuration data can assist attackers in mapping internal network topology, identifying critical infrastructure, and planning subsequent attacks such as lateral movement or targeted exploitation of other vulnerabilities. Although no public exploits have been reported yet, the presence of sensitive configuration data leakage represents a significant risk in environments where IBM Sterling B2B Integrator is used for secure business-to-business file transfers and integrations. The vulnerability affects several versions, including 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.5 and 6.2.1.1, highlighting the need for organizations to verify their deployment versions and apply any available patches or mitigations.
Potential Impact
For European organizations, the exposure of sensitive server IP configuration information can have several adverse effects. IBM Sterling B2B Integrator is widely used in sectors such as finance, manufacturing, logistics, and telecommunications, which are critical to European economies. Disclosure of internal IP addresses can facilitate reconnaissance activities by threat actors, enabling them to map network architecture and identify valuable targets for further exploitation. This can increase the risk of subsequent attacks such as lateral movement, privilege escalation, or targeted ransomware campaigns. Additionally, organizations handling sensitive or regulated data under GDPR may face compliance risks if such information disclosure leads to broader data breaches. The medium severity rating suggests that while the vulnerability alone may not cause direct operational disruption, it significantly lowers the barrier for attackers to conduct more damaging intrusions. European companies with complex B2B integrations and supply chain dependencies may be particularly vulnerable, as attackers could leverage disclosed network details to compromise partner systems or intercept sensitive transactions.
Mitigation Recommendations
Organizations should first identify if they are running affected versions of IBM Sterling B2B Integrator or IBM Sterling File Gateway. Since no patch links are currently provided, it is critical to monitor IBM security advisories for official patches or updates addressing CVE-2025-36112. In the interim, network segmentation should be enforced to restrict access to the Sterling B2B Integrator servers, limiting exposure to trusted IP ranges only. Implement strict firewall rules and intrusion detection/prevention systems to monitor and block unauthorized access attempts. Employ network-level encryption and VPNs for all B2B communications to reduce the risk of interception. Regularly audit and review server configurations to ensure sensitive information is not unnecessarily exposed via management interfaces or error messages. Additionally, conduct penetration testing and vulnerability assessments focused on information disclosure vectors. Finally, enhance monitoring for unusual reconnaissance activity that could indicate exploitation attempts leveraging disclosed IP information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:17.123Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6924acb465c0297328b2f7b0
Added to database: 11/24/2025, 7:06:28 PM
Last enriched: 11/24/2025, 7:21:36 PM
Last updated: 11/24/2025, 11:22:56 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10144: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in quadlayers Perfect Brands for WooCommerce
MediumCVE-2024-47856: n/a
UnknownCVE-2025-54347: n/a
CriticalCVE-2025-63674: n/a
MediumCVE-2025-54563: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.