CVE-2025-0162
Published: 07 March 2025
Summary
CVE-2025-0162 is a high-severity Improper Restriction of XML External Entity Reference (CWE-611) vulnerability in Ibm Aspera Shares. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates XXE by requiring validation of XML inputs to block external entity processing that enables sensitive information disclosure or memory exhaustion.
Requires timely flaw remediation through patching of the specific XXE vulnerability in IBM Aspera Shares as detailed in the vendor advisory.
Enforces secure configuration settings for XML parsers within the system to disable external entity resolution and prevent XXE exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XXE vulnerability in public-facing web application directly enables exploitation via T1190 and facilitates local file reading for sensitive data disclosure via T1005.
NVD Description
IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
Deeper analysisAI
CVE-2025-0162 is an XML external entity injection (XXE) vulnerability, mapped to CWE-611, affecting IBM Aspera Shares versions 1.9.9 through 1.10.0 PL7. The issue arises when the software processes XML data, potentially allowing improper handling of external entities.
A remote authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation could enable the attacker to disclose sensitive information (C:H) or consume memory resources (A:L), with no integrity impact (I:N) and unchanged scope (S:U). The CVSS v3.1 base score is 7.1.
IBM's security advisory provides details on mitigation and patching; see https://www.ibm.com/support/pages/node/7185096.
Details
- CWE(s)