CVE-2025-36104

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Storage Scale allows authenticated users to access sensitive files through insecure SMB protocol permissions. It affects IBM Storage Scale versions 5.2.3.0 and 5.2.3.1. Attackers with valid credentials can read files they shouldn't have access to.

💻 Affected Systems

Products:
  • IBM Storage Scale
Versions: 5.2.3.0 and 5.2.3.1
Operating Systems: Linux (IBM Storage Scale supported platforms)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with SMB protocol enabled and configured. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access sensitive configuration files, credentials, or proprietary data stored on the Storage Scale system, potentially leading to data breach or further system compromise.

🟠

Likely Case

Authenticated users (including low-privilege accounts) accessing files they shouldn't have permission to view, potentially exposing sensitive operational data.

🟢

If Mitigated

Minimal impact with proper access controls, network segmentation, and monitoring in place to detect unauthorized file access attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials and SMB access to the affected Storage Scale system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Storage Scale 5.2.3.2 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7239562

Restart Required: Yes

Instructions:

1. Download IBM Storage Scale 5.2.3.2 or later from IBM Fix Central. 2. Follow IBM Storage Scale upgrade procedures. 3. Restart affected services after upgrade completion.

🔧 Temporary Workarounds

Restrict SMB Access

linux

Limit SMB protocol access to only necessary users and systems using firewall rules and access controls.

# Configure firewall to restrict SMB ports (typically 445/tcp)
iptables -A INPUT -p tcp --dport 445 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 445 -j DROP

Review and Tighten File Permissions

linux

Audit and correct file permissions on sensitive directories to prevent unauthorized access through SMB.

# Review current permissions on sensitive directories
find /path/to/sensitive -type f -exec ls -la {} \;
# Set appropriate permissions
chmod 600 /path/to/sensitive/files

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for SMB file access
  • Segment Storage Scale systems from general user networks

🔍 How to Verify

Check if Vulnerable:

Check IBM Storage Scale version: mmfsadm dump version | grep 'Release' and verify if version is 5.2.3.0 or 5.2.3.1

Check Version:

mmfsadm dump version | grep 'Release'

Verify Fix Applied:

Verify version is 5.2.3.2 or later: mmfsadm dump version | grep 'Release'

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMB file access patterns
  • Multiple failed SMB authentication attempts followed by successful access
  • Access to sensitive files from unexpected user accounts

Network Indicators:

  • SMB traffic to Storage Scale systems from unexpected sources
  • Unusual file enumeration patterns over SMB

SIEM Query:

source="storage_scale_logs" AND (event="file_access" AND user NOT IN authorized_users) OR (protocol="SMB" AND file_path CONTAINS sensitive_patterns)

🔗 References

📤 Share & Export