Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36171: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Aspera Faspex

0
Medium
VulnerabilityCVE-2025-36171cvecve-2025-36171cwe-770
Published: Thu Oct 09 2025 (10/09/2025, 13:57:51 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Aspera Faspex

Description

IBM Aspera Faspex 5.0.0 through 5.0.13.1 could allow a privileged user to cause a denial of service from improperly validated API input due to excessive resource consumption.

AI-Powered Analysis

AILast updated: 10/09/2025, 14:23:32 UTC

Technical Analysis

CVE-2025-36171 is a vulnerability identified in IBM Aspera Faspex versions 5.0.0 through 5.0.13.1, classified under CWE-770, which concerns the allocation of resources without proper limits or throttling. This flaw allows a privileged user to exploit improperly validated API inputs to cause excessive resource consumption, leading to a denial of service (DoS) condition. The vulnerability specifically impacts the availability of the affected system by exhausting resources, potentially causing the Faspex service to become unresponsive or crash. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects only availability (A:H) without compromising confidentiality or integrity. No public exploits have been reported, and no patches have been released at the time of publication. IBM Aspera Faspex is widely used in enterprise environments for secure, high-speed file transfers, often in industries such as media, finance, and government. The vulnerability could be leveraged by insiders or attackers with elevated privileges to disrupt critical file transfer operations, potentially impacting business continuity and service delivery.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of critical file transfer services provided by IBM Aspera Faspex. Industries relying on secure and efficient large file transfers, such as media production, financial services, and government agencies, could experience operational downtime or degraded service availability. This could lead to delays in business processes, loss of productivity, and potential contractual or regulatory compliance issues related to service availability. Since exploitation requires privileged access, the risk is heightened in environments where privilege management is lax or where insider threats exist. The unavailability of Faspex services could also indirectly affect other dependent systems or workflows, amplifying the operational impact. However, the lack of confidentiality or integrity impact limits the risk of data breaches or data manipulation from this vulnerability alone.

Mitigation Recommendations

European organizations should implement strict privilege management policies to limit access to IBM Aspera Faspex administrative functions and APIs. Monitoring and alerting on unusual resource consumption patterns within Faspex can help detect early signs of exploitation attempts. Network segmentation and access controls should be enforced to restrict API access to trusted administrators only. Until IBM releases an official patch, organizations can consider implementing resource usage limits at the operating system or container level to prevent excessive consumption by Faspex processes. Regularly reviewing and updating security configurations and conducting internal audits of privileged user activities will reduce the risk of insider exploitation. Additionally, organizations should maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. Close coordination with IBM support and monitoring IBM security advisories for patch releases is essential for timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:22.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7c1d2ba0e608b4f9cd95d

Added to database: 10/9/2025, 2:08:18 PM

Last enriched: 10/9/2025, 2:23:32 PM

Last updated: 10/9/2025, 5:26:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats