Cyber Posture

CVE-2025-13718

Low

Published: 13 March 2026

Published
13 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0002 6.3th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13718 is a low-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Ibm Sterling Partner Engagement Manager. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-319

Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.

addresses: CWE-319

By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.

addresses: CWE-319

Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.

addresses: CWE-319

Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.

addresses: CWE-319

Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.

addresses: CWE-319

Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.

addresses: CWE-319

Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.

addresses: CWE-319

Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
Why these techniques?

Vulnerability enables cleartext transmission of sensitive data over networks, directly facilitating passive network sniffing to capture information (T1040).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors.

Deeper analysisAI

IBM Sterling Partner Engagement Manager versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 are affected by CVE-2025-13718, a vulnerability that allows sensitive information to be transmitted in cleartext over a communication channel susceptible to sniffing by unauthorized actors. This issue, published on 2026-03-13, is classified under CWE-319 (Cleartext Transmission of Sensitive Information) and carries a CVSS v3.1 base score of 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating low severity with low confidentiality impact but no impact on integrity or availability.

A remote attacker with network access can exploit this vulnerability by sniffing the communication channel, though it requires high attack complexity and no user privileges or interaction. Successful exploitation enables the attacker to obtain sensitive information disclosed in cleartext, potentially compromising confidentiality depending on the nature of the data transmitted.

IBM has published an advisory with details on this vulnerability at https://www.ibm.com/support/pages/node/7263391, which security practitioners should consult for mitigation guidance and any available patches.

Details

CWE(s)

Affected Products

ibm
sterling partner engagement manager
6.2.3 — 6.2.3.6 · 6.2.3 — 6.2.3.6 · 6.2.4 — 6.2.4.3

CVEs Like This One

CVE-2025-13726Same product: Ibm Sterling Partner Engagement Manager
CVE-2025-13723Same product: Ibm Sterling Partner Engagement Manager
CVE-2025-69272Same product: Linux Linux Kernel
CVE-2026-30796Same product: Linux Linux Kernel
CVE-2026-30795Same product: Linux Linux Kernel
CVE-2024-41742Same product: Linux Linux Kernel
CVE-2024-45643Same product: Linux Linux Kernel
CVE-2025-33088Same product: Linux Linux Kernel
CVE-2025-36253Same product: Linux Linux Kernel
CVE-2025-13214Same product: Linux Linux Kernel

References