CVE Alert: CVE-2025-36274 – IBM – Aspera HTTP Gateway

CVE-2025-36274

HIGHNo exploitation known

IBM Aspera HTTP Gateway 2.0.0 through 2.3.1 stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
IBM
Product
Aspera HTTP Gateway
Versions
2.0.0 lte 2.3.1
CWE
CWE-319, CWE-319 Cleartext Transmission of Sensitive Information
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-09-26T14:14:01.082Z
Updated
2025-09-26T14:57:32.217Z
cpe:2.3:a:ibm:aspera_http_gateway:2.0.0:*:*:*:*:*:*:*cpe:2.3:a:ibm:aspera_http_gateway:2.3.1:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk of unauthenticated network exposure leading to sensitive data disclosure; no explicit exploitation evidence in this record, but the vector is easy to reach and impactful.

Why this matters

Cleartext storage of sensitive data means an attacker can exfiltrate data without credentials, potentially breaching confidentiality obligations and triggering regulatory or contractual penalties. The access could enable mass data theft or leakage of personal or proprietary information, with reputational and operational consequences.

Most likely attack path

No authentication required over the network, enabling automated access to readable files. Pre-conditions are simply a reachable gateway instance; once reachable, an attacker can retrieve stored data with no user interaction or privileges. Scope remains unchanged, and disruption is less about integrity or availability but direct data exposure.

Who is most exposed

Organisations with internet- or DMZ-facing data transfer gateways, especially in enterprises using external file-sharing or partner integrations, are most at risk; cloud or on‑prem deployments with public exposure amplify the likelihood of exploitation.

Detection ideas

  • Unauthenticated requests to endpoints returning sensitive files in cleartext
  • Sudden spikes in data egress from the gateway
  • Access logs showing repeated reads from unknown or external IPs
  • Files being downloaded or listed in cleartext through web endpoints
  • Anomalous ACL or directory listing indicators

Mitigation and prioritisation

  • Patch to version 2.3.2 immediately; upgrade is essential
  • Restrict exposure: enforce authentication, use TLS, apply network allowlisting
  • Implement WAF rules and monitor for unauthenticated access attempts
  • Review and tighten access controls; isolate gateway behind VPN or bastion
  • Change-management: plan tests in staging, schedule downtime if needed

Note: If KEV is true or EPSS ≥ 0.5, treat as priority 1.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.