IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是IBM API Connect的一个严重安全漏洞,编号CVE-2025-13915,CVSS评分9.8分。这个漏洞允许攻击者绕过认证,远程访问应用。影响的版本包括10.0.8.0到10.0.8.5以及10.0.11.0。IBM建议用户下载修复补丁,并在无法安装时禁用开发者门户的自助注册功能。 接下来,我需要将这些信息浓缩到100字以内。要注意不使用“文章内容总结”之类的开头,直接描述即可。同时,保持语言简洁明了。 可能的结构是:IBM披露API Connect严重漏洞(CVE编号),评分高,影响特定版本,建议修复或禁用功能以降低风险。 现在检查字数是否在限制内,并确保所有关键点都涵盖:漏洞名称、评分、影响版本、修复建议。这样用户就能快速了解主要内容了。 </think> IBM披露API Connect严重漏洞(CVE-2025-13915),CVSS评分9.8分,可被攻击者绕过认证远程访问应用。受影响版本包括10.0.8.0至10.0.8.5及10.0.11.0。建议用户下载修复补丁或禁用自助注册以降低风险。 2025-12-31 13:37:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

API Security / Vulnerability

API Connect Bug

IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application.

The vulnerability, tracked as CVE-2025-13915, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. It has been described as an authentication bypass flaw.

"IBM API Connect could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application," the tech giant said in a bulletin.

The shortcoming affects the following versions of IBM API Connect -

  • 10.0.8.0 through 10.0.8.5
  • 10.0.11.0
Cybersecurity

Customers are advised to follow the steps outlined below -

  • Download the fix from Fix Central
  • Extract the files: Readme.md and ibm-apiconnect-<version>-ifix.13195.tar.gz
  • Apply the fix based on the appropriate API Connect version

"Customers unable to install the interim fix should disable self-service sign-up on their Developer Portal if enabled, which will help minimise their exposure to this vulnerability," the company added.

API Connect is an end-to-end application programming interface (API) solution that allows organizations to create, test, manage, and secure APIs located on cloud and on-premises. It's used by companies like Axis Bank, Bankart, Etihad Airways, Finologee, IBS Bulgaria, State Bank of India, Tata Consultancy Services, and TINE.

While there is no evidence of the vulnerability being exploited in the wild, users are advised to apply the fixes as soon as possible for optimal protection.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/ibm-warns-of-critical-api-connect-bug.html
如有侵权请联系:admin#unsafe.sh