Cyber Posture

CVE-2025-14480

Medium

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0001 0.8th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14480 is a medium-severity Use of a Broken or Risky Cryptographic Algorithm (CWE-327) vulnerability in Ibm Aspera Faspio Gateway. Its CVSS base score is 5.1 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 0.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Unsecured Credentials (T1552).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-327

Contacts with security groups provide timely information on broken or risky cryptographic algorithms, reducing the likelihood of their selection and use.

addresses: CWE-327

Ongoing education and sharing of recommended practices helps organizations identify and migrate away from broken or risky cryptographic algorithms.

addresses: CWE-327

Cross-organization threat feeds commonly include advances in cryptanalysis and active exploits against weak or broken algorithms, allowing organizations to deprecate them proactively.

addresses: CWE-327

Capital planning and funding allow selection and ongoing support of strong cryptographic algorithms rather than weak or broken ones.

addresses: CWE-327

Risk updates surface newly-broken or risky cryptographic algorithms as threat intelligence and computing advances evolve, enabling timely replacement.

addresses: CWE-327

Scanners flag use of broken or weak cryptographic algorithms via known-vulnerability databases.

addresses: CWE-327

Enforces approved cryptographic algorithms for each use case, blocking use of broken or risky algorithms.

addresses: CWE-327

Flaw remediation replaces broken or risky cryptographic algorithms once safer implementations are released by vendors.

MITRE ATT&CK Enterprise TechniquesAI

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Weak crypto implementation enables local decryption of sensitive data (often credentials/keys), directly facilitating unsecured credential access.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Aspera faspio Gateway 1.3.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information

Deeper analysisAI

CVE-2025-14480 is a cryptographic weakness in IBM Aspera faspio Gateway version 1.3.6, where the software employs weaker than expected cryptographic algorithms (CWE-327). This flaw could allow an attacker to decrypt highly sensitive information. The vulnerability carries a CVSS v3.1 base score of 5.1 (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating moderate severity primarily due to its high confidentiality impact.

Exploitation requires local access to the affected system with no privileges or user interaction needed, though it demands high attack complexity. An attacker who meets these conditions could achieve high-impact unauthorized access to confidential data by decrypting it, without disrupting integrity or availability.

IBM has published a security advisory with details on the vulnerability and mitigation at https://www.ibm.com/support/pages/node/7261491. Security practitioners should consult this reference for patch availability and recommended remediation steps.

Details

CWE(s)

Affected Products

ibm
aspera faspio gateway
1.3.6

CVEs Like This One

CVE-2024-22347Same vendor: Ibm
CVE-2024-27256Same vendor: Ibm
CVE-2024-31896Same vendor: Ibm
CVE-2023-43029Same vendor: Ibm
CVE-2025-68698Shared CWE-327
CVE-2025-1719Same vendor: Ibm
CVE-2025-13691Same vendor: Ibm
CVE-2024-43178Same vendor: Ibm
CVE-2025-36253Same vendor: Ibm
CVE-2024-45643Same vendor: Ibm

References