CVE-2025-36348

4.9 MEDIUM

📋 TL;DR

This vulnerability in IBM Sterling B2B Integrator and File Gateway exposes sensitive technical error messages to remote privileged attackers. Attackers can gain detailed system information that could facilitate further attacks. Affected versions include 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1.

💻 Affected Systems

Products:
  • IBM Sterling B2B Integrator
  • IBM Sterling File Gateway
Versions: 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have privileged access to the application; affects both B2B Integrator and File Gateway products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker obtains detailed system architecture, configuration, and error information that enables targeted follow-on attacks, potentially leading to full system compromise.

🟠

Likely Case

Privileged attacker gathers reconnaissance data about system configuration, software versions, and error conditions to plan more sophisticated attacks.

🟢

If Mitigated

Limited information disclosure with no direct system access; attacker gains only technical error details without authentication bypass or code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged access; attacker simply needs to trigger error conditions and observe detailed responses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM fix packs as specified in advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7259769

Restart Required: Yes

Instructions:

1. Review IBM advisory 2. Download appropriate fix pack for your version 3. Apply fix following IBM documentation 4. Restart application services 5. Verify error messages no longer contain sensitive details

🔧 Temporary Workarounds

Configure generic error messages

all

Configure application to return generic error messages instead of detailed technical information

Refer to IBM documentation for error message configuration

Restrict privileged access

all

Implement strict access controls to limit privileged user accounts

Review and tighten RBAC policies
Implement least privilege principle

🧯 If You Can't Patch

  • Implement web application firewall (WAF) to filter error responses
  • Monitor application logs for unusual error patterns and privileged access attempts

🔍 How to Verify

Check if Vulnerable:

Check if running affected versions and test if detailed error messages are returned to privileged users

Check Version:

Check application version in admin console or configuration files

Verify Fix Applied:

Test that error conditions return generic messages without sensitive technical details

📡 Detection & Monitoring

Log Indicators:

  • Unusual error patterns
  • Multiple error requests from single privileged user
  • Detailed error messages in logs

Network Indicators:

  • HTTP responses containing detailed error information
  • Unusual error response sizes

SIEM Query:

source="sterling_app" AND (message="*error*" OR message="*exception*") | stats count by src_ip, user

🔗 References

📤 Share & Export