Aspera console Vulnerabilities

Security vulnerability tracking for Ibm Aspera console

Last updated: Mar 16, 2026
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

3

Vulnerability Timeline

3 vulnerabilities discovered over time for Aspera console

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-134605.3

This vulnerability allows an attacker to discover valid usernames within IBM Aspera Console by exploiting differences in system responses. The attacker needs to interact with the application in a way that reveals these discrepancies, which could lead to further attacks like password guessing.

ibmaspera console
Exploit Available
23 days agoMar 16, 2026
CVE-2025-134594.9

This vulnerability allows a privileged user to disrupt the service by misusing the system's workflow controls, potentially causing downtime. It affects specific versions of IBM Aspera Console, so users running those versions should be cautious about how workflows are managed.

ibmaspera console
Exploit Available
23 days agoMar 16, 2026
CVE-2025-132124.3

This vulnerability allows an authenticated user to disrupt the email service, potentially causing it to become unavailable for others. It occurs because the system doesn't properly manage how often users can interact with the email service, leading to a denial of service.

ibmaspera console
Exploit Available
23 days agoMar 16, 2026

About Ibm Aspera console Security

This page provides comprehensive security vulnerability tracking for Ibm Aspera console. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Aspera console updated to the latest version
  • • Subscribe to security advisories from Ibm
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately