CVE-2025-3355

7.5 HIGH

📋 TL;DR

CVE-2025-3355 is a directory traversal vulnerability in IBM Tivoli Monitoring that allows remote attackers to read arbitrary files on the system by sending specially crafted URL requests containing directory traversal sequences. This affects IBM Tivoli Monitoring 6.3.0.7 through Service Pack 21. Organizations running these versions are vulnerable to unauthorized file access.

💻 Affected Systems

Products:
  • IBM Tivoli Monitoring
Versions: 6.3.0.7 through 6.3.0.7 Service Pack 21
Operating Systems: All supported operating systems for IBM Tivoli Monitoring
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within the affected version range are vulnerable by default. The vulnerability requires network access to the Tivoli Monitoring web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, password files, or application data, potentially leading to complete system compromise, credential theft, or data exfiltration.

🟠

Likely Case

Attackers will likely attempt to read common sensitive files like /etc/passwd, configuration files, or application logs to gather information for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the compromised application's context and accessible files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple HTTP requests. No authentication is required, making this particularly dangerous for internet-facing systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Service Pack 22 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7249694

Restart Required: Yes

Instructions:

1. Download IBM Tivoli Monitoring Service Pack 22 or later from IBM Fix Central. 2. Review the installation prerequisites. 3. Stop all Tivoli Monitoring services. 4. Apply the service pack according to IBM documentation. 5. Restart all services. 6. Verify the installation was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to IBM Tivoli Monitoring web interface to trusted IP addresses only

Web Application Firewall Rules

all

Configure WAF rules to block URL requests containing directory traversal sequences (../, ..\, etc.)

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Tivoli Monitoring systems
  • Deploy a web application firewall with rules specifically blocking directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Tivoli Monitoring. If it's between 6.3.0.7 and Service Pack 21 inclusive, the system is vulnerable.

Check Version:

On Windows: Check Add/Remove Programs or run 'wmic product get name,version'. On Linux: Check installation logs or use IBM Tivoli Monitoring administration tools.

Verify Fix Applied:

Verify that Service Pack 22 or later is installed by checking the version in the Tivoli Monitoring administration console or via command line tools.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' sequences in URLs
  • Unusual file access patterns from web server logs
  • Failed attempts to access sensitive system paths

Network Indicators:

  • HTTP GET requests with encoded directory traversal sequences (%2e%2e%2f, %252e%252e%252f)
  • Multiple requests attempting to access different directory levels

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*" OR url="*%252e%252e%252f*")

🔗 References

📤 Share & Export