Privilege Escalation Risk in IBM Sterling Connect Direct for Unix
CVE-2025-36137

7.2HIGH

Key Information:

Vendor

IBM

Vendor
CVE Published:
30 October 2025

What is CVE-2025-36137?

IBM Sterling Connect Direct for Unix contains a vulnerability where Control Center Director (CCD) users are assigned unnecessary permissions for maintenance tasks. This misconfiguration can potentially allow a privileged user to further escalate their privileges through post-update scripts, leading to unauthorized access and control over critical system components.

Affected Version(s)

Sterling Connect:Direct for Unix 6.2.0.7 <= 6.2.0.9 iFix004

Sterling Connect:Direct for Unix 6.4.0.0 <= 6.4.0.2 iFix001

Sterling Connect:Direct for Unix 6.3.0.2 <= 6.3.0.5 iFix002

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-36137 : Privilege Escalation Risk in IBM Sterling Connect Direct for Unix