Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36115: CWE-384 Session Fixation in IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0

0
Medium
VulnerabilityCVE-2025-36115cvecve-2025-36115cwe-384
Published: Tue Jan 20 2026 (01/20/2026, 15:18:17 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0

Description

IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0.00 through 5.2.0.12 does not disallow the session id after use which could allow an authenticated user to impersonate another user on the system.

AI-Powered Analysis

AILast updated: 01/20/2026, 15:51:19 UTC

Technical Analysis

CVE-2025-36115 is a session fixation vulnerability classified under CWE-384, affecting IBM Sterling Connect:Express Adapter for Sterling B2B Integrator versions 5.2.0.00 through 5.2.0.12. The vulnerability stems from the product's failure to invalidate or disallow reuse of session identifiers after their initial use. In a typical secure session management process, session IDs should be regenerated or invalidated upon authentication or privilege changes to prevent session fixation attacks. Here, the persistent session ID allows an attacker who is already authenticated with limited privileges to fixate a session ID and then impersonate another user, potentially with higher privileges. The attack vector is network-based, with low complexity, requiring the attacker to have some level of privileges but no user interaction. The impact includes potential unauthorized access, confidentiality breaches, integrity violations, and availability disruptions within the B2B integration environment. The vulnerability affects critical business-to-business communication workflows, which often handle sensitive transactional data. Although no public exploits are known, the medium CVSS score (6.3) reflects the moderate risk posed by this vulnerability. No patches have been officially linked yet, so organizations must rely on configuration and monitoring controls until remediation is available.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of B2B integration processes that rely on IBM Sterling Connect:Express Adapter. Exploitation could allow attackers to impersonate legitimate users, potentially accessing sensitive business data, altering transaction flows, or disrupting automated business communications. This can lead to financial losses, regulatory non-compliance (especially under GDPR due to data breaches), and reputational damage. Organizations in sectors such as finance, manufacturing, logistics, and telecommunications that depend heavily on secure B2B integrations are particularly vulnerable. The medium severity indicates that while the vulnerability is not trivially exploitable by unauthenticated attackers, the consequences of exploitation are significant enough to warrant urgent attention. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

1. Implement strict session management policies: Ensure that session IDs are invalidated immediately after logout or privilege escalation events. 2. Monitor and audit session activities to detect anomalies such as session reuse or multiple concurrent sessions from different IP addresses. 3. Restrict access to the Sterling Connect:Express Adapter interface to trusted networks and users using network segmentation and firewall rules. 4. Apply the principle of least privilege to users interacting with the system to limit the potential impact of compromised sessions. 5. Regularly update and patch IBM Sterling products as soon as official fixes become available. 6. Employ multi-factor authentication (MFA) to reduce the risk of session hijacking leading to unauthorized access. 7. Conduct penetration testing and vulnerability assessments focused on session management controls within the B2B integration environment. 8. Engage with IBM support to obtain any interim patches or recommended configuration changes to mitigate session fixation risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:17.124Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fa0dc4623b1157c3be2c5

Added to database: 1/20/2026, 3:35:56 PM

Last enriched: 1/20/2026, 3:51:19 PM

Last updated: 1/20/2026, 8:21:06 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats