CVE-2025-36274

7.5 HIGH

📋 TL;DR

IBM Aspera HTTP Gateway versions 2.0.0 through 2.3.1 store sensitive information in plain text files that can be accessed by unauthenticated users. This allows attackers to read credentials, tokens, or other sensitive data without authentication. Organizations using these vulnerable versions of IBM Aspera HTTP Gateway are affected.

💻 Affected Systems

Products:
  • IBM Aspera HTTP Gateway
Versions: 2.0.0 through 2.3.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable unless specifically hardened.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, compromise the entire Aspera deployment, exfiltrate sensitive data, and pivot to other systems.

🟠

Likely Case

Attackers harvest credentials or tokens to gain unauthorized access to Aspera file transfers and potentially access sensitive files.

🟢

If Mitigated

Limited exposure if files are protected by additional access controls or network segmentation prevents external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only file read access to known or discoverable file paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.2 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7246284

Restart Required: Yes

Instructions:

1. Download IBM Aspera HTTP Gateway version 2.3.2 or later from IBM Fix Central. 2. Backup configuration files. 3. Install the update following IBM's installation guide. 4. Restart the Aspera HTTP Gateway service.

🔧 Temporary Workarounds

Restrict file system permissions

linux

Apply strict file permissions to sensitive configuration files to prevent unauthorized read access.

chmod 600 /path/to/sensitive/files
chown root:root /path/to/sensitive/files

Network segmentation

all

Place Aspera HTTP Gateway behind firewall rules that restrict access to trusted IP addresses only.

🧯 If You Can't Patch

  • Remove internet-facing exposure by placing the service behind VPN or strict firewall rules.
  • Implement additional monitoring and alerting for unauthorized file access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version via Aspera administration interface or configuration files. If version is between 2.0.0 and 2.3.1 inclusive, the system is vulnerable.

Check Version:

Check the version in the Aspera HTTP Gateway admin interface or configuration files.

Verify Fix Applied:

Verify the version is 2.3.2 or later and test that sensitive files are no longer readable by unauthenticated users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to configuration files
  • Failed authentication attempts followed by successful file reads

Network Indicators:

  • HTTP requests to known configuration file paths from unauthorized sources

SIEM Query:

source="aspera_logs" AND (file_access="*.conf" OR file_access="*.cfg") AND user="unauthenticated"

🔗 References

📤 Share & Export