Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sterling_file_gateway Vendor: ibm

About This Product

sterling_file_gateway is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 86 known vulnerabilities affecting ibm sterling_file_gateway. This includes 7 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2013 to 2026, indicating a sustained research interest and ongoing security attention. 70 medium-severity issues and 9 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-5937 2013-04-12 2025-04-11 - 9.3 Likely
CVE-2013-0455 2013-07-02 2025-04-11 - 4.3 Likely
CVE-2013-2983 2013-07-02 2025-04-11 - 3.5 Unknown
CVE-2012-5766 2013-07-03 2025-04-11 - 6.5 Likely
CVE-2012-5936 2013-07-03 2025-04-11 - 5.0 Likely
CVE-2013-0456 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-0463 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-0468 2013-07-03 2025-04-11 - 3.5 Unknown
CVE-2013-0475 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-0476 2013-07-03 2025-04-11 - 6.4 Likely
CVE-2013-0479 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-0481 2013-07-03 2025-04-11 - 5.0 Likely
CVE-2013-0539 2013-07-03 2025-04-11 - 5.0 Likely
CVE-2013-0558 2013-07-03 2025-04-11 - 5.0 Likely
CVE-2013-0560 2013-07-03 2025-04-11 - 6.5 Likely
CVE-2013-0567 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-0568 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-2982 2013-07-03 2025-04-11 - 6.5 Likely
CVE-2013-2984 2013-07-03 2025-04-11 - 6.5 Likely
CVE-2013-2985 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-2987 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-3020 2013-07-03 2025-04-11 - 4.0 Likely
CVE-2013-4002 2013-07-23 2025-04-11 - 7.1 Likely
CVE-2013-5405 2013-12-21 2025-04-11 - 3.5 Unknown
CVE-2013-5406 2013-12-21 2025-04-11 - 3.5 Unknown
CVE-2013-5407 2013-12-21 2025-04-11 - 4.9 Unknown
CVE-2013-5409 2013-12-21 2025-04-11 - 6.5 Likely
CVE-2013-5411 2013-12-21 2025-04-11 - 4.3 Likely
CVE-2013-5413 2013-12-21 2025-04-11 - 4.3 Likely
CVE-2014-6199 2015-01-10 2025-04-12 - 5.0 Likely
CVE-2015-0194 2017-08-02 2025-04-20 6.5 4.0 Likely
CVE-2017-1487 2017-12-07 2025-04-20 6.5 4.0 Likely
CVE-2017-1497 2017-12-07 2025-04-20 3.7 4.3 Likely
CVE-2017-1548 2017-12-11 2025-04-20 5.3 5.0 Likely
CVE-2017-1549 2017-12-11 2025-04-20 5.4 3.5 Unknown
CVE-2017-1550 2017-12-11 2025-04-20 6.5 4.0 Likely
CVE-2017-1632 2017-12-11 2025-04-20 5.4 3.5 Unknown
CVE-2014-0912 2018-04-20 2024-11-21 5.3 5.0 Likely
CVE-2014-0927 2018-04-20 2024-11-21 8.1 4.3 Likely
CVE-2017-1544 2018-07-20 2024-11-21 2.4 2.1 Unknown
CVE-2017-1575 2018-07-20 2024-11-21 5.1 2.1 Unknown
CVE-2018-1398 2018-07-20 2024-11-21 5.3 5.0 Likely
CVE-2018-1470 2018-07-20 2024-11-21 4.3 4.0 Likely
CVE-2018-1563 2018-07-20 2024-11-21 5.4 3.5 Unknown
CVE-2019-4147 2019-09-16 2024-11-21 7.2 6.5 Likely
CVE-2019-4280 2019-09-30 2024-11-21 5.3 5.0 Likely
CVE-2019-4423 2019-09-30 2024-11-21 5.3 5.0 Likely
CVE-2020-4259 2020-05-14 2024-11-21 6.5 4.0 Likely
CVE-2020-4299 2020-05-14 2024-11-21 4.3 4.0 Likely
CVE-2020-4564 2020-10-20 2024-11-21 5.4 3.5 Unknown
CVE-2020-4476 2020-11-16 2024-11-21 7.5 5.0 Likely
CVE-2020-4647 2020-11-16 2024-11-21 8.8 6.5 Likely
CVE-2020-4665 2020-11-16 2024-11-21 4.3 4.3 Likely
CVE-2020-4763 2020-11-16 2024-11-21 4.3 4.3 Likely
CVE-2020-4658 2020-12-16 2024-11-21 6.1 4.3 Likely
CVE-2021-20484 2021-09-23 2024-11-21 5.4 3.5 Unknown
CVE-2021-20485 2021-09-23 2024-11-21 4.3 4.0 Likely
CVE-2021-20563 2021-09-23 2024-11-21 4.3 4.0 Likely
CVE-2021-20473 2021-10-07 2024-11-21 6.5 4.0 Likely
CVE-2021-20481 2021-10-07 2024-11-21 6.1 4.3 Likely
CVE-2021-20489 2021-10-07 2024-11-21 8.8 6.8 Likely
CVE-2021-20552 2021-10-07 2024-11-21 4.3 4.0 Likely
CVE-2020-4654 2021-10-08 2024-11-21 6.5 4.0 Likely
CVE-2021-39086 2022-08-16 2024-11-21 5.3 - -
CVE-2023-47714 2024-04-12 2025-03-07 4.8 - -
CVE-2023-47159 2025-01-27 2025-03-05 4.3 - -
CVE-2023-52292 2025-01-27 2025-11-06 6.4 - -
CVE-2024-22316 2025-01-27 2025-09-29 4.3 - -
CVE-2024-47109 2025-03-10 2025-07-25 5.3 - -
CVE-2024-54183 2025-06-18 2025-07-25 5.4 - -
CVE-2024-54172 2025-06-18 2025-07-25 4.3 - -
CVE-2025-1348 2025-06-18 2025-07-25 4.0 - -
CVE-2025-1349 2025-06-18 2025-07-25 5.5 - -
CVE-2025-2793 2025-07-08 2025-08-02 5.4 - -
CVE-2025-2827 2025-07-08 2025-08-02 4.3 - -
CVE-2025-3630 2025-07-08 2025-08-02 6.4 - -
CVE-2025-33014 2025-07-18 2025-08-02 5.4 - -
CVE-2025-33008 2025-08-19 2025-09-18 5.4 - -
CVE-2025-2988 2025-08-19 2025-09-17 2.7 - -
CVE-2025-2667 2025-09-04 2025-09-10 2.7 - -
CVE-2025-2694 2025-09-04 2025-09-10 4.8 - -
CVE-2025-36002 2025-10-16 2025-10-25 5.5 - -
CVE-2025-36135 2025-11-07 2025-12-11 5.4 - -
CVE-2025-36112 2025-11-24 2025-12-01 5.3 - -
CVE-2025-36134 2025-11-25 2025-12-01 3.7 - -
CVE-2025-36348 2026-02-17 2026-02-20 4.9 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm sterling_file_gateway by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.