CVE-2025-36088

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in IBM TS4500 web GUI that allows authenticated users to inject malicious JavaScript. The vulnerability could lead to session hijacking or credential theft within trusted sessions. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM TS4500 Tape Library
Versions: 1.11.0.0-D00, 1.11.0.1-C00, 1.11.0.2-C00, 1.10.00-F00
Operating Systems: IBM TS4500 firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the web GUI interface; requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could steal administrator credentials, gain full system control, and potentially pivot to other systems in the environment.

🟠

Likely Case

An authenticated user could steal session cookies or credentials from other users accessing the web GUI, leading to unauthorized access to the tape library management interface.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to authenticated users who would already have some level of access to the system.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of vulnerable input fields; exploitation requires social engineering or access to vulnerable interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest firmware update as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7242263

Restart Required: No

Instructions:

1. Download the latest firmware from IBM Fix Central. 2. Follow IBM TS4500 firmware update procedures. 3. Verify the update completes successfully. 4. Test web GUI functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for web GUI fields

Session Security Controls

all

Implement strict session management, including short session timeouts and secure cookie attributes

🧯 If You Can't Patch

  • Restrict web GUI access to only necessary administrative users
  • Implement web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via web GUI System Information page

Check Version:

Check via web GUI: System > System Information > Firmware Version

Verify Fix Applied:

Verify firmware version is updated beyond affected versions and test XSS payloads in input fields

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in web GUI access logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual HTTP POST requests with JavaScript payloads to TS4500 web interface

SIEM Query:

source="ts4500_web_logs" AND (http_method="POST" AND (uri_contains("script") OR body_contains("javascript:")))

🔗 References

📤 Share & Export