CVE-2025-36137 (GCVE-0-2025-36137)
Vulnerability from cvelistv5 – Published: 2025-10-30 18:53 – Updated: 2025-11-01 03:55
VLAI?
Summary
IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts.
Severity ?
7.2 (High)
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct for Unix |
Affected:
6.2.0.7 , ≤ 6.2.0.9 iFix004
(semver)
Affected: 6.4.0.0 , ≤ 6.4.0.2 iFix001 (semver) Affected: 6.3.0.2 , ≤ 6.3.0.5 iFix002 (semver) cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.7:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.9:ifix004:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.4.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.4.0.2.:ifix001:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.5.:ifix002:*:*:*:unix:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-36137",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-01T03:55:53.155Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.2.0.7:*:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.2.0.9:ifix004:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.4.0.0:*:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.4.0.2.:ifix001:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.3.0.5.:ifix002:*:*:*:unix:*:*"
],
"defaultStatus": "unaffected",
"product": "Sterling Connect:Direct for Unix",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "6.2.0.9 iFix004",
"status": "affected",
"version": "6.2.0.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.0.2 iFix001",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.3.0.5 iFix002",
"status": "affected",
"version": "6.3.0.2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts."
}
],
"value": "IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T18:53:32.576Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249678"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes IBM strongly recommends addressing the vulnerability now by upgrading Product Version Remediation/Fix/Instructions IBM Sterling Connect:Direct for UNIX 6.4.0 Apply 6.4.0.2.iFix004, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.3.0 Apply 6.3.0.5.iFix008, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.9.iFix005, available on Fix Central .\u003c/p\u003e"
}
],
"value": "Remediation/Fixes IBM strongly recommends addressing the vulnerability now by upgrading Product Version Remediation/Fix/Instructions IBM Sterling Connect:Direct for UNIX 6.4.0 Apply 6.4.0.2.iFix004, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.3.0 Apply 6.3.0.5.iFix008, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.9.iFix005, available on Fix Central ."
}
],
"title": "IBM Sterling Connect:Direct for UNIX command execution",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-36137",
"datePublished": "2025-10-30T18:53:32.576Z",
"dateReserved": "2025-04-15T21:16:19.008Z",
"dateUpdated": "2025-11-01T03:55:53.155Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-36137\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-10-30T19:16:23.593\",\"lastModified\":\"2025-11-04T15:41:56.843\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7249678\",\"source\":\"psirt@us.ibm.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-36137\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-30T19:08:57.450814Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-30T19:09:06.406Z\"}}], \"cna\": {\"title\": \"IBM Sterling Connect:Direct for UNIX command execution\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.2.0.7:*:*:*:*:unix:*:*\", \"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.2.0.9:ifix004:*:*:*:unix:*:*\", \"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.4.0.0:*:*:*:*:unix:*:*\", \"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.4.0.2.:ifix001:*:*:*:unix:*:*\", \"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.3.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:sterling_connect\\\\:direct:6.3.0.5.:ifix002:*:*:*:unix:*:*\"], \"vendor\": \"IBM\", \"product\": \"Sterling Connect:Direct for Unix\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.0.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.2.0.9 iFix004\"}, {\"status\": \"affected\", \"version\": \"6.4.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.4.0.2 iFix001\"}, {\"status\": \"affected\", \"version\": \"6.3.0.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.3.0.5 iFix002\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Remediation/Fixes IBM strongly recommends addressing the vulnerability now by upgrading Product Version Remediation/Fix/Instructions IBM Sterling Connect:Direct for UNIX 6.4.0 Apply 6.4.0.2.iFix004, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.3.0 Apply 6.3.0.5.iFix008, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.9.iFix005, available on Fix Central .\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eRemediation/Fixes IBM strongly recommends addressing the vulnerability now by upgrading Product Version Remediation/Fix/Instructions IBM Sterling Connect:Direct for UNIX 6.4.0 Apply 6.4.0.2.iFix004, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.3.0 Apply 6.3.0.5.iFix008, available on Fix Central . IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.9.iFix005, available on Fix Central .\u003c/p\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7249678\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"ibm-cvegen\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM Sterling Connect Direct for Unix 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002 incorrectly assigns permissions for maintenance tasks to Control Center Director (CCD) users that could allow a privileged user to escalate their privileges further due to unnecessary privilege assignment for post update scripts.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250 Execution with Unnecessary Privileges\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-10-30T18:53:32.576Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-36137\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-01T03:55:53.155Z\", \"dateReserved\": \"2025-04-15T21:16:19.008Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-10-30T18:53:32.576Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…