CVE-2025-13460

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to discover valid usernames within IBM Aspera Console by exploiting differences in system responses. The attacker needs to interact with the application in a way that reveals these discrepancies, which could lead to further attacks like password guessing.

Technical Description

IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Mar 16, 2026

22 days ago

Last Modified

Mar 17, 2026

21 days ago

Vendor

ibm

Product

aspera console

Related Vulnerabilities

CVE-2025-13459Medium

This vulnerability allows a privileged user to disrupt the service by misusing the system's workflow controls, potentially causing downtime. It affects specific versions of IBM Aspera Console, so users running those versions should be cautious about how workflows are managed.

CVE-2025-13212Medium

This vulnerability allows an authenticated user to disrupt the email service, potentially causing it to become unavailable for others. It occurs because the system doesn't properly manage how often users can interact with the email service, leading to a denial of service.

CVE-2025-13726High

This vulnerability allows a remote attacker to access sensitive information from IBM Sterling Partner Engagement Manager due to detailed error messages being exposed. If an attacker can trigger these error messages, they could gather valuable information that might help them launch further attacks on the system.

CVE-2025-13723High

An attacker can exploit this vulnerability to access sensitive user information by using an expired access token, which means they don't need valid credentials to gain this information. This issue affects specific versions of IBM Sterling Partner Engagement Manager, so organizations using these versions should take immediate action to secure their systems.

CVE-2025-13718High

This vulnerability allows an attacker to intercept and read sensitive information being transmitted over the network in cleartext, which means it’s not encrypted and can be easily accessed by anyone monitoring the communication. It affects specific versions of IBM Sterling Partner Engagement Manager, and the attacker only needs to be able to listen to the network traffic to exploit this weakness.