Cyber Posture

CVE-2023-37398

Medium

Published: 29 January 2025

Published
29 January 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0016 36.6th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Description

IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.

Security Summary

CVE-2023-37398 is a vulnerability in IBM Aspera Faspex versions 5.0.0 through 5.0.10, where the software does not enforce strong passwords by default. This weakness, classified under CWE-521 (Weak Password Requirements), enables attackers to more readily compromise user accounts through password guessing or brute-force attempts. The issue carries a CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting network accessibility with high attack complexity but significant confidentiality impact.

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. The high attack complexity arises from the need to perform repeated authentication attempts against accounts protected only by weak or default passwords. Successful exploitation allows attackers to gain unauthorized access to compromised user accounts, potentially exposing sensitive data transferred via the Faspex platform.

IBM has published an advisory detailing mitigation steps at https://www.ibm.com/support/pages/node/7181814, which security practitioners should consult for patching and configuration recommendations to enforce stronger password policies.

Details

CWE(s)
CWE-521

Affected Products

ibm
aspera faspex
5.0.0 — 5.0.10

References