IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive user information using an expired access token
References
| Link | Resource |
|---|---|
| https://www.ibm.com/support/pages/node/7263391 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Mar 2026, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:standard:*:*:* cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:essentials:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Linux Ibm Ibm sterling Partner Engagement Manager |
|
| References | () https://www.ibm.com/support/pages/node/7263391 - Vendor Advisory | |
| Summary |
|
13 Mar 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:53
Updated : 2026-03-18 19:18
NVD link : CVE-2025-13723
Mitre link : CVE-2025-13723
CVE.ORG link : CVE-2025-13723
JSON object : View
Products Affected
linux
- linux_kernel
ibm
- sterling_partner_engagement_manager
CWE
CWE-324
Use of a Key Past its Expiration Date
