CVE-2025-36229
📋 TL;DR
This vulnerability in IBM Aspera Faspex 5 allows authenticated users to enumerate sensitive information by discovering package identifiers. It affects organizations using IBM Aspera Faspex 5 versions 5.0.0 through 5.0.14.1 for high-speed file transfers.
💻 Affected Systems
- IBM Aspera Faspex 5
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could map all data packages in the system, potentially identifying sensitive files and their metadata for targeted attacks.
Likely Case
Information disclosure allowing attackers to discover what data packages exist and potentially infer sensitive business activities.
If Mitigated
Limited information exposure with proper access controls and monitoring in place.
🎯 Exploit Status
Exploitation requires valid user credentials; enumeration likely involves API or interface queries.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.0.14.2 or later
Vendor Advisory: https://www.ibm.com/support/pages/node/7255331
Restart Required: Yes
Instructions:
1. Download IBM Aspera Faspex 5 version 5.0.14.2 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Install the update following IBM's installation guide. 4. Restart the Aspera Faspex service.
🔧 Temporary Workarounds
Restrict User Access
allLimit authenticated user access to only necessary personnel and implement least privilege principles.
Enhanced Monitoring
allMonitor for unusual enumeration patterns in application logs.
🧯 If You Can't Patch
- Implement strict access controls and audit all authenticated user activities.
- Segment the Aspera Faspex instance from sensitive networks and implement network monitoring.
🔍 How to Verify
Check if Vulnerable:
Check Aspera Faspex version via admin interface or configuration files; versions 5.0.0 through 5.0.14.1 are vulnerable.
Check Version:
Check Aspera Faspex admin console or configuration files for version information.
Verify Fix Applied:
Verify version is 5.0.14.2 or later and test that authenticated users cannot enumerate package IDs beyond their permissions.
📡 Detection & Monitoring
Log Indicators:
- Unusual patterns of package ID queries
- Multiple sequential package enumeration attempts from single users
Network Indicators:
- High volume of API calls to package endpoints
- Patterned requests for sequential package IDs
SIEM Query:
source="aspera_faspex" AND (event_type="package_query" OR api_endpoint="/packages/*") AND count > threshold