CVE-2025-0159

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on IBM FlashSystem RPCAdapter endpoints by sending specially crafted HTTP requests. Affected systems include IBM Storage Virtualize versions 8.5.0.0 through 8.7.2.1. Attackers could gain unauthorized access to storage management functions without valid credentials.

💻 Affected Systems

Products:
  • IBM FlashSystem
  • IBM Storage Virtualize
Versions: 8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1
Operating Systems: IBM Storage Virtualize OS
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running affected versions with RPCAdapter endpoints accessible are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of storage system allowing data theft, destruction, or ransomware deployment across connected storage infrastructure.

🟠

Likely Case

Unauthorized access to storage management functions leading to data exposure, configuration changes, or service disruption.

🟢

If Mitigated

Limited impact if systems are isolated behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.1 indicates critical severity with low attack complexity. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.5.0.14, 8.5.2.4, 8.5.3.2, 8.6.0.6, 8.6.2.2, 8.7.0.3, 8.7.2.2 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7184182

Restart Required: Yes

Instructions:

1. Backup system configuration and data. 2. Download appropriate fix from IBM Fix Central. 3. Apply fix following IBM documentation. 4. Restart system as required. 5. Verify fix applied successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to IBM FlashSystem management interfaces

Configure firewall rules to allow only trusted IPs to access management ports

Access Control Lists

all

Implement strict network ACLs to limit RPCAdapter endpoint access

Use network devices to filter traffic to vulnerable endpoints

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and internet
  • Implement strict network segmentation and monitor for suspicious access attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM Storage Virtualize version via management interface or CLI

Check Version:

svcinfo lslicense or check via IBM Storage Virtualize web interface

Verify Fix Applied:

Verify version is updated to patched version and test authentication requirements

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to RPCAdapter endpoints
  • Authentication bypass logs
  • Unexpected configuration changes

Network Indicators:

  • HTTP requests to RPCAdapter endpoints from unauthorized sources
  • Unusual traffic patterns to management interfaces

SIEM Query:

source="ibm_flashsystem" AND (event="authentication_failure" OR event="rpcadapter_access")

🔗 References

📤 Share & Export