CVE-2025-13925
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-30
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | aspera_console | 3.4.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-532 | The product writes sensitive information to a log file. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability involves storing potentially sensitive information in log files accessible to local privileged users, which could lead to unauthorized disclosure of sensitive data. This may impact compliance with standards and regulations such as GDPR and HIPAA that require protection of sensitive information and proper access controls. Organizations using IBM Aspera Console 3.4.7 should consider this risk in their compliance assessments and apply the recommended upgrade to version 3.4.8 to mitigate the issue. [1]
Can you explain this vulnerability to me?
This vulnerability in IBM Aspera Console 3.4.7 involves the storage of potentially sensitive information in log files that can be accessed by a local privileged user. It is related to underlying issues in the Rack Ruby web server interface used by the product, which can lead to information disclosure and denial of service due to unbounded memory consumption when handling certain HTTP requests. The problem is fixed by upgrading to IBM Aspera Console 3.4.8, which includes updated Rack versions addressing these issues. [1]
How can this vulnerability impact me? :
The vulnerability can lead to sensitive information disclosure if a local privileged user accesses log files containing this data. Additionally, it can cause denial of service conditions by exhausting server memory through specially crafted HTTP requests, potentially crashing application workers or severely degrading performance. This impacts system availability and confidentiality. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves identifying if IBM Aspera Console version 3.4.7 or vulnerable Rack Ruby web server versions (prior to 2.2.20, 3.1.18, and 3.2.3) are in use. You can check the installed version of IBM Aspera Console and Rack components. For example, on the system running the application, use commands like `rpm -qa | grep aspera` or `dpkg -l | grep aspera` to check Aspera Console version, and `gem list rack` or `bundle list | grep rack` to check Rack versions. Additionally, monitor logs for any unusual access patterns or attempts to exploit `x-sendfile` headers or unusually large multipart form submissions that could indicate exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade IBM Aspera Console to version 3.4.8, which includes fixes for the vulnerabilities by updating the Rack Ruby web server to secure versions (2.2.20, 3.1.18, or 3.2.3). Additionally, configure proxies (e.g., Nginx, Apache) to limit request body sizes (e.g., using Nginx's `client_max_body_size` or Apache's `LimitRequestBody`) to prevent memory exhaustion attacks. Also, ensure proxies consistently set or strip `x-sendfile` and related headers to prevent information disclosure. Disabling sendfile in Rails applications is another option if upgrading is not immediately possible. [1]