IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information when detailed technical error messages are returned. This information could be used in further attacks against the system.
References
| Link | Resource |
|---|---|
| https://www.ibm.com/support/pages/node/7263391 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Mar 2026, 20:28
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:standard:*:*:* cpe:2.3:a:ibm:sterling_partner_engagement_manager:*:*:*:*:essentials:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| References | () https://www.ibm.com/support/pages/node/7263391 - Vendor Advisory | |
| First Time |
Linux linux Kernel
Linux Ibm Ibm sterling Partner Engagement Manager |
13 Mar 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:53
Updated : 2026-03-18 20:28
NVD link : CVE-2025-13726
Mitre link : CVE-2025-13726
CVE.ORG link : CVE-2025-13726
JSON object : View
Products Affected
linux
- linux_kernel
ibm
- sterling_partner_engagement_manager
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
