CVE-2025-36120
📋 TL;DR
This vulnerability allows authenticated users in IBM Storage Virtualize to escalate privileges via SSH sessions due to improper authorization checks. Attackers could gain administrative access to storage systems. Affects IBM Storage Virtualize versions 8.4 through 8.7.
💻 Affected Systems
- IBM Storage Virtualize
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to access, modify, or delete all storage data, disrupt operations, and potentially pivot to other systems.
Likely Case
Privilege escalation leading to unauthorized access to sensitive storage configurations and data management functions.
If Mitigated
Limited impact if strong access controls, network segmentation, and monitoring are in place to detect unusual SSH activity.
🎯 Exploit Status
Exploitation requires authenticated SSH access but appears straightforward based on the CWE-863 description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.4.0.0, 8.5.0.0, 8.6.0.0, 8.7.0.0 (refer to IBM advisory for specific patch versions)
Vendor Advisory: https://www.ibm.com/support/pages/node/7240796
Restart Required: Yes
Instructions:
1. Review IBM advisory for specific patch versions. 2. Apply the appropriate patch for your Storage Virtualize version. 3. Restart the system as required. 4. Verify the patch was successfully applied.
🔧 Temporary Workarounds
Restrict SSH Access
allLimit SSH access to only necessary administrative users and systems using network controls.
Configure firewall rules to restrict SSH access to specific IP addresses
Implement Least Privilege
allReview and minimize the number of users with SSH access to storage systems.
Review user accounts and remove unnecessary SSH access
🧯 If You Can't Patch
- Implement strict network segmentation to isolate storage systems from general user networks
- Enhance monitoring of SSH sessions for unusual privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check IBM Storage Virtualize version via management interface or CLI. If version is 8.4, 8.5, 8.6, or 8.7 without patches, system is vulnerable.
Check Version:
Check via IBM Storage Virtualize management interface or use system-specific CLI commands
Verify Fix Applied:
Verify the applied patch version matches or exceeds the fixed versions listed in IBM advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual SSH login patterns
- Privilege escalation attempts in system logs
- Unauthorized administrative commands executed
Network Indicators:
- SSH connections from unexpected sources
- Multiple failed SSH attempts followed by successful login
SIEM Query:
source="storage_system" AND (event="ssh_login" OR event="privilege_escalation") AND user!="authorized_admin"