CVE-2025-14115
Published: 20 January 2026
Summary
CVE-2025-14115 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Ibm (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 1.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of flaws like hard-coded credentials, directly enabling application of IBM's recommended interim fixes or upgrades to eliminate the vulnerability.
Mandates management of authenticators including changing defaults, protecting from disclosure, and ensuring sufficient strength, directly countering the use of unmanageable hard-coded credentials for authentication and encryption.
Enables scanning to identify vulnerabilities such as CVE-2025-14115 involving hard-coded credentials in the affected IBM Sterling Connect:Direct versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded credentials (CWE-798) directly enable local discovery of unsecured creds in files/binaries (T1552.001) and subsequent use of those valid local accounts for auth bypass (T1078.003).
NVD Description
IBM Sterling Connect:Direct for UNIX Container 6.3.0.0 through 6.3.0.6 Interim Fix 016, and 6.4.0.0 through 6.4.0.3 Interim Fix 019 IBM® Sterling Connect:Direct for UNIX contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own…
more
inbound authentication, outbound communication to external components, or encryption of internal data.
Deeper analysisAI
IBM Sterling Connect:Direct for UNIX Container versions 6.3.0.0 through 6.3.0.6 Interim Fix 016, and 6.4.0.0 through 6.4.0.3 Interim Fix 019 are affected by CVE-2025-14115. The vulnerability stems from hard-coded credentials, such as a password or cryptographic key, which the software uses for inbound authentication, outbound communication to external components, or encryption of internal data. Published on 2026-01-20, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-798 (Use of Hard-coded Credentials).
Local attackers can exploit this issue with low complexity and no privileges, as it requires only local access (AV:L) and no user interaction (UI:N). Exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing attackers to bypass authentication, intercept or alter communications, or decrypt internal data protected by the hard-coded credentials.
The IBM security bulletin at https://www.ibm.com/support/pages/node/7257143 details the flaw and advises applying the latest interim fixes beyond IF016 for 6.3 or IF019 for 6.4, or upgrading to patched releases to eliminate the hard-coded credentials and mitigate the risk.
Details
- CWE(s)