CVE-2025-36137

7.2 HIGH

📋 TL;DR

This vulnerability in IBM Sterling Connect Direct for Unix allows CCD users with existing privileges to escalate their permissions further through maintenance task assignments. It affects users of specific versions who have access to Control Center Director functionality. The issue stems from unnecessary privilege assignments in post-update scripts.

💻 Affected Systems

Products:
  • IBM Sterling Connect Direct for Unix
Versions: 6.2.0.7 through 6.2.0.9 iFix004, 6.4.0.0 through 6.4.0.2 iFix001, and 6.3.0.2 through 6.3.0.5 iFix002
Operating Systems: Unix/Linux systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Control Center Director (CCD) users who have existing administrative privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A privileged CCD user could gain full administrative control over the Sterling Connect Direct system, potentially compromising all managed file transfers and system operations.

🟠

Likely Case

Privileged CCD users could perform unauthorized administrative actions beyond their intended scope, potentially disrupting file transfer operations or accessing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to authorized users performing legitimate administrative tasks within their defined scope.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated access to the Control Center Director interface, which is typically not exposed to the internet.
🏢 Internal Only: HIGH - This affects internal privileged users who could exploit their existing access to gain additional unauthorized privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access as a privileged CCD user. The vulnerability involves privilege escalation through existing maintenance task permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM advisory: 6.2.0.9 iFix005, 6.4.0.2 iFix002, or 6.3.0.5 iFix003

Vendor Advisory: https://www.ibm.com/support/pages/node/7249678

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific fix details. 2. Download appropriate fix from IBM Fix Central. 3. Apply fix following IBM installation instructions. 4. Restart Sterling Connect Direct services. 5. Verify fix application.

🔧 Temporary Workarounds

Restrict CCD User Privileges

linux

Review and reduce privileges assigned to CCD users to minimum required for their roles

Review CCD user permissions via Sterling Connect Direct administration interface

Monitor Administrative Actions

all

Implement enhanced logging and monitoring of CCD user activities

Configure audit logging for all CCD administrative actions

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for all CCD users
  • Enable comprehensive audit logging and regularly review CCD user activities

🔍 How to Verify

Check if Vulnerable:

Check Sterling Connect Direct version and compare against affected versions list. Review CCD user permissions for excessive maintenance task assignments.

Check Version:

Check version via Sterling Connect Direct administration interface or configuration files

Verify Fix Applied:

Verify installed version is patched (6.2.0.9 iFix005, 6.4.0.2 iFix002, or 6.3.0.5 iFix003). Test CCD user permissions to confirm no excessive maintenance task privileges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CCD user performing maintenance tasks
  • Privilege escalation attempts in CCD logs
  • Unauthorized administrative actions by CCD users

Network Indicators:

  • Unusual administrative traffic patterns to CCD interface

SIEM Query:

source="sterling_cd" AND (event_type="privilege_escalation" OR user_role_change OR unauthorized_maintenance_task)

🔗 References

📤 Share & Export