{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-36064","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2025-04-15T21:16:12.197Z","datePublished":"2025-09-22T18:25:38.219Z","dateUpdated":"2026-03-13T22:06:14.885Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2026-03-13T22:06:14.885Z"},"title":"IBM Sterling Connect:Express for Microsoft Windows information disclosure","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-307","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","type":"CWE"}]}],"affected":[{"vendor":"IBM","product":"Sterling Connect:Express for Microsoft Windows","versions":[{"status":"affected","version":"3.1.0.0","lessThanOrEqual":"3.1.0.22","versionType":"semver"}],"defaultStatus":"unaffected","cpes":["cpe:2.3:a:ibm:sterling_connect\\:express_for_windows:3.1.0.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:sterling_connect\\:express_for_windows:3.1.0.22:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"IBM Sterling Connect:Express for Microsoft Windows 3.1.0.0 through 3.1.0.22 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.","supportingMedia":[{"type":"text/html","base64":false,"value":"IBM Sterling Connect:Express for Microsoft Windows 3.1.0.0 through 3.1.0.22 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials."}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7245761","tags":["vendor-advisory","patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.9,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}}],"solutions":[{"lang":"en","value":"IBM strongly recommends addressing the vulnerability now by upgrading ...\n\nAffected Product(s)Version(s)Remediation / FixIBM Sterling Connect:Express for Microsoft Windows3.1.0.0 - 3.1.0.22Apply  3.1.0.23 https://www.ibm.com/support/fixcentral/swg/selectFixes , available on Fix Central","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>IBM strongly recommends addressing the vulnerability now by upgrading ...</p><div><div><div><div><div><div><table><tbody><tr><td><strong>Affected Product(s)</strong></td><td><strong>Version(s)</strong></td><td><strong>Remediation / Fix</strong></td></tr><tr><td>IBM Sterling Connect:Express for Microsoft Windows</td><td>3.1.0.0 - 3.1.0.22</td><td>Apply <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EOther%20software&amp;product=ibm/Other+software/IBM+Sterling+Connect%3AExpress+for+Microsoft+Windows&amp;release=All&amp;platform=Windows&amp;function=aparId&amp;apars=IT48571\">3.1.0.23</a>, available on Fix Central</td></tr></tbody></table></div></div></div></div></div></div>\n\n<br>"}]}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-22T20:29:35.309961Z","id":"CVE-2025-36064","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-22T20:29:49.385Z"}}]}}