Impact
IBM Sterling Partner Engagement Manager versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 are vulnerable to a remote information‑disclosure flaw that occurs when detailed technical error messages are returned to an attacker. These messages can expose sensitive system information, which could be leveraged for further attacks. The weakness is categorized as a System Information Leak (CWE‑209).
Affected Systems
Affected products include IBM Sterling Partner Engagement Manager Essentials Edition and Standard Edition. The specific affected version ranges are 6.2.3.0‑6.2.3.5 and 6.2.4.0‑6.2.4.2. Remediation is available in version 6.2.3.6 for the 6.2.3.x line and 6.2.4.3 for the 6.2.4.x line. The issue is identified in the following CPEs: cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:essentials:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:standard:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.3.0:*:*:*:essentials:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.3.0:*:*:*:standard:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.3.5:*:*:*:essentials:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.3.5:*:*:*:standard:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.4.0:*:*:*:essentials:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.4.0:*:*:*:standard:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.4.2:*:*:*:essentials:*:*:*, cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.4.2:*:*:*:standard:*:*:*
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% implies a low expected exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that exploitation requires a remote attacker to trigger an error condition in the application, causing detailed technical information to be sent back to the requester. No special access or privileged conditions are explicitly mentioned, suggesting that the attack can be performed through standard network interaction with the affected service.
OpenCVE Enrichment