CVE-2025-13925

4.9 MEDIUM

📋 TL;DR

IBM Aspera Console 3.4.7 stores sensitive information in log files that could be accessed by local privileged users. This vulnerability allows attackers with local system access to potentially obtain credentials, configuration details, or other sensitive data. Only IBM Aspera Console installations are affected.

💻 Affected Systems

Products:
  • IBM Aspera Console
Versions: 3.4.7
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where log files contain sensitive information and privileged local access exists.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged local attacker obtains administrative credentials or sensitive configuration data, leading to full system compromise or data exfiltration.

🟠

Likely Case

Local administrator or compromised privileged account accesses sensitive information like API keys, connection strings, or user data from logs.

🟢

If Mitigated

Information exposure limited to non-critical data due to proper log sanitization and access controls.

🌐 Internet-Facing: LOW - This requires local privileged access, not remote exploitation.
🏢 Internal Only: MEDIUM - Internal privileged users or compromised accounts could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local privileged access to read log files. No authentication bypass needed beyond local system privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix from IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7256544

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin for specific patch details
2. Apply the provided fix from IBM
3. Restart IBM Aspera Console services
4. Verify log files no longer contain sensitive information

🔧 Temporary Workarounds

Restrict log file permissions

linux

Set strict file permissions on IBM Aspera Console log directories to prevent unauthorized access

chmod 600 /path/to/aspera/logs/*
chown root:root /path/to/aspera/logs/*

Configure log sanitization

all

Configure IBM Aspera Console to redact sensitive information from logs

Edit configuration to enable log sanitization features

🧯 If You Can't Patch

  • Implement strict access controls on log directories to limit access to authorized administrators only
  • Regularly audit and sanitize log files to remove sensitive information

🔍 How to Verify

Check if Vulnerable:

Check if IBM Aspera Console version is 3.4.7 and examine log files for sensitive information like passwords, keys, or credentials

Check Version:

Check IBM Aspera Console version in administration interface or configuration files

Verify Fix Applied:

Verify updated version is installed and test that log files no longer contain sensitive information

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log directories
  • Sensitive information patterns in log files

Network Indicators:

  • None - this is a local file access vulnerability

SIEM Query:

Search for file access events to IBM Aspera Console log directories by non-administrative users

🔗 References

📤 Share & Export