CVE-2025-3355
📋 TL;DR
CVE-2025-3355 is a directory traversal vulnerability in IBM Tivoli Monitoring that allows remote attackers to read arbitrary files on the system by sending specially crafted URL requests containing directory traversal sequences. This affects IBM Tivoli Monitoring 6.3.0.7 through Service Pack 21. Organizations running these versions are vulnerable to unauthorized file access.
💻 Affected Systems
- IBM Tivoli Monitoring
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, password files, or application data, potentially leading to complete system compromise, credential theft, or data exfiltration.
Likely Case
Attackers will likely attempt to read common sensitive files like /etc/passwd, configuration files, or application logs to gather information for further attacks.
If Mitigated
With proper network segmentation and access controls, impact is limited to the compromised application's context and accessible files.
🎯 Exploit Status
Directory traversal vulnerabilities are typically easy to exploit with simple HTTP requests. No authentication is required, making this particularly dangerous for internet-facing systems.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply Service Pack 22 or later
Vendor Advisory: https://www.ibm.com/support/pages/node/7249694
Restart Required: Yes
Instructions:
1. Download IBM Tivoli Monitoring Service Pack 22 or later from IBM Fix Central. 2. Review the installation prerequisites. 3. Stop all Tivoli Monitoring services. 4. Apply the service pack according to IBM documentation. 5. Restart all services. 6. Verify the installation was successful.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to IBM Tivoli Monitoring web interface to trusted IP addresses only
Web Application Firewall Rules
allConfigure WAF rules to block URL requests containing directory traversal sequences (../, ..\, etc.)
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to Tivoli Monitoring systems
- Deploy a web application firewall with rules specifically blocking directory traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check the installed version of IBM Tivoli Monitoring. If it's between 6.3.0.7 and Service Pack 21 inclusive, the system is vulnerable.
Check Version:
On Windows: Check Add/Remove Programs or run 'wmic product get name,version'. On Linux: Check installation logs or use IBM Tivoli Monitoring administration tools.
Verify Fix Applied:
Verify that Service Pack 22 or later is installed by checking the version in the Tivoli Monitoring administration console or via command line tools.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' or '..\' sequences in URLs
- Unusual file access patterns from web server logs
- Failed attempts to access sensitive system paths
Network Indicators:
- HTTP GET requests with encoded directory traversal sequences (%2e%2e%2f, %252e%252e%252f)
- Multiple requests attempting to access different directory levels
SIEM Query:
source="web_server_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*" OR url="*%252e%252e%252f*")