CVE-2025-36120

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users in IBM Storage Virtualize to escalate privileges via SSH sessions due to improper authorization checks. Attackers could gain administrative access to storage systems. Affects IBM Storage Virtualize versions 8.4 through 8.7.

💻 Affected Systems

Products:
  • IBM Storage Virtualize
Versions: 8.4, 8.5, 8.6, 8.7
Operating Systems: IBM Storage Virtualize OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated SSH access to the storage system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to access, modify, or delete all storage data, disrupt operations, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive storage configurations and data management functions.

🟢

If Mitigated

Limited impact if strong access controls, network segmentation, and monitoring are in place to detect unusual SSH activity.

🌐 Internet-Facing: LOW (SSH should not be internet-facing for storage systems)
🏢 Internal Only: HIGH (Internal authenticated users can exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated SSH access but appears straightforward based on the CWE-863 description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.4.0.0, 8.5.0.0, 8.6.0.0, 8.7.0.0 (refer to IBM advisory for specific patch versions)

Vendor Advisory: https://www.ibm.com/support/pages/node/7240796

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific patch versions. 2. Apply the appropriate patch for your Storage Virtualize version. 3. Restart the system as required. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Restrict SSH Access

all

Limit SSH access to only necessary administrative users and systems using network controls.

Configure firewall rules to restrict SSH access to specific IP addresses

Implement Least Privilege

all

Review and minimize the number of users with SSH access to storage systems.

Review user accounts and remove unnecessary SSH access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate storage systems from general user networks
  • Enhance monitoring of SSH sessions for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM Storage Virtualize version via management interface or CLI. If version is 8.4, 8.5, 8.6, or 8.7 without patches, system is vulnerable.

Check Version:

Check via IBM Storage Virtualize management interface or use system-specific CLI commands

Verify Fix Applied:

Verify the applied patch version matches or exceeds the fixed versions listed in IBM advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SSH login patterns
  • Privilege escalation attempts in system logs
  • Unauthorized administrative commands executed

Network Indicators:

  • SSH connections from unexpected sources
  • Multiple failed SSH attempts followed by successful login

SIEM Query:

source="storage_system" AND (event="ssh_login" OR event="privilege_escalation") AND user!="authorized_admin"

🔗 References

📤 Share & Export