CVE-2025-13460

| EUVD-2025-208660 MEDIUM
2026-03-13 ibm
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 17, 2026 - 15:50 nvd
Patch available
Analysis Generated
Mar 13, 2026 - 21:01 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 21:01 euvd
EUVD-2025-208660
CVE Published
Mar 13, 2026 - 19:54 nvd
MEDIUM 5.3

Description

IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy.

Analysis

IBM Aspera Console versions 3.3.0 through 3.4.8 contain a username enumeration vulnerability caused by observable response discrepancies in authentication mechanisms. An unauthenticated remote attacker can exploit this to enumerate valid usernames through response analysis, enabling reconnaissance for subsequent targeted attacks. With a CVSS score of 5.3 and low attack complexity, this is a low-to-moderate severity information disclosure issue suitable for standard patch management cycles rather than emergency response.

Technical Context

The vulnerability exists in IBM Aspera Console (cpe:2.3:a:ibm:aspera_console) and falls under CWE-204 (Observable Response Discrepancy), a timing or behavioral analysis class where the system leaks information through differences in error messages, response times, or HTTP status codes during authentication attempts. In this case, the Aspera Console authentication handler likely returns distinguishable responses when presented with valid versus invalid usernames—for example, different HTTP status codes (401 vs 404), varying response lengths, or distinct error message strings. This allows attackers to systematically probe the application to determine which usernames exist in the system without needing valid credentials. The vulnerability is specific to the Aspera Console product line, a commercial file transfer and workflow acceleration platform commonly deployed in enterprise environments for high-performance data distribution.

Affected Products

IBM Aspera Console versions 3.3.0 through 3.4.8 are affected. The vulnerability is confirmed via the CPE cpe:2.3:a:ibm:aspera_console and affects all patch levels within this version range. IBM has released patched versions beyond 3.4.8 to remediate this issue. Refer to IBM's security advisory (IBM X-Force / PSIRT documentation) and the official Aspera product security notices for complete patch availability and supported upgrade paths specific to your deployment architecture.

Remediation

Immediately upgrade IBM Aspera Console to version 3.4.9 or later, or to the latest 3.5.x release if available, following IBM's official patch guidance and pre-upgrade compatibility checks for your deployment. If immediate patching is not feasible, implement network-level access controls to restrict Aspera Console authentication endpoints to trusted IP ranges, disable or firewall any public-facing authentication interfaces, and deploy HTTP request logging to detect enumeration attempts (e.g., high volumes of failed login requests to the same endpoint with varying usernames). Enable multi-factor authentication where supported to reduce the impact of compromised credentials obtained through enumeration. Monitor Aspera console logs for suspicious authentication patterns and coordinate with identity and access management teams to enforce strong password policies that reduce the value of enumerated usernames to attackers.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: 0

Share

CVE-2025-13460 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy