Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36137: CWE-250 Execution with Unnecessary Privileges in IBM Sterling Connect:Direct for Unix

0
High
VulnerabilityCVE-2025-36137cvecve-2025-36137cwe-250
Published: Thu Oct 30 2025 (10/30/2025, 18:53:32 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Connect:Direct for Unix

Description

CVE-2025-36137 is a high-severity vulnerability in IBM Sterling Connect:Direct for Unix versions 6. 2. 0. 7 through 6. 2. 0. 9 iFix004, 6. 4. 0. 0 through 6.

AI-Powered Analysis

AILast updated: 11/08/2025, 02:43:46 UTC

Technical Analysis

CVE-2025-36137 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting IBM Sterling Connect:Direct for Unix in specific versions ranging from 6.2.0.7 to 6.4.0.2 with certain interim fixes. The issue arises because the software incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users. Specifically, post-update scripts are granted excessive privileges beyond what is necessary, enabling a privileged user with CCD access to escalate their privileges further. This escalation could allow an attacker to execute arbitrary code with higher privileges, potentially leading to full system compromise. The vulnerability has a CVSS v3.1 base score of 7.2, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability represents a significant risk due to the critical role of Sterling Connect:Direct in secure file transfer operations in enterprise environments. The vulnerability affects multiple versions and fix levels, emphasizing the need for careful version management and patching. The root cause is improper privilege assignment in maintenance scripts, a common security design flaw that can be exploited by insiders or attackers who have gained some level of privileged access. The vulnerability is particularly concerning because it leverages legitimate maintenance mechanisms, making detection and prevention more challenging.

Potential Impact

For European organizations, the impact of CVE-2025-36137 can be severe. IBM Sterling Connect:Direct is widely used in industries requiring secure, reliable file transfers such as banking, insurance, manufacturing, and logistics. Exploitation could allow attackers to escalate privileges from an already privileged user to full administrative control, enabling data theft, manipulation, or disruption of critical file transfer operations. This could lead to breaches of sensitive personal data protected under GDPR, causing regulatory penalties and reputational damage. Additionally, disruption of file transfer workflows could impact business continuity, especially in supply chain and financial transaction processing. The high integrity and availability impact means attackers could alter or delete critical files or disrupt services, potentially causing operational outages. Given the network attack vector and no user interaction requirement, the vulnerability could be exploited remotely by insiders or external attackers who have gained privileged access, increasing the risk profile. Organizations with complex, distributed deployments of Sterling Connect:Direct are particularly vulnerable due to the difficulty in uniformly applying mitigations and monitoring privileged user activities.

Mitigation Recommendations

1. Apply official patches or fixes from IBM as soon as they become available for the affected versions of Sterling Connect:Direct for Unix. 2. Until patches are available, restrict Control Center Director (CCD) user permissions to the minimum necessary, removing any unnecessary privileges related to maintenance tasks and post-update scripts. 3. Implement strict access controls and monitoring on CCD accounts, including multi-factor authentication and detailed logging of all maintenance and update activities. 4. Conduct regular audits of user privileges and review post-update script permissions to ensure they do not exceed the principle of least privilege. 5. Segment network access to Sterling Connect:Direct servers to limit exposure to only trusted administrative networks. 6. Employ host-based intrusion detection systems to monitor for anomalous privilege escalation or script execution activities. 7. Educate system administrators and security teams about the risk of privilege escalation via maintenance scripts and enforce secure operational procedures. 8. Maintain an up-to-date inventory of Sterling Connect:Direct deployments and versions to prioritize patching and risk management efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.008Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903b838aebfcd5474944466

Added to database: 10/30/2025, 7:10:48 PM

Last enriched: 11/8/2025, 2:43:46 AM

Last updated: 12/15/2025, 1:42:16 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats