CVE-2025-36104: CWE-277 Insecure Inherited Permissions in IBM Storage Scale
IBM Storage Scale 5.2.3.0 and 5.2.3.1 could allow an authenticated user to obtain sensitive information from files due to the insecure permissions inherited through the SMB protocol.
AI Analysis
Technical Summary
CVE-2025-36104 is a medium-severity vulnerability affecting IBM Storage Scale versions 5.2.3.0 and 5.2.3.1. The vulnerability arises from insecure inherited permissions through the SMB (Server Message Block) protocol, which is used for network file sharing. Specifically, an authenticated user with legitimate access to the system can exploit this flaw to obtain sensitive information from files that they should not normally be able to access. The root cause is related to CWE-277, which concerns improper access control due to insecure permission inheritance. In this case, the SMB protocol's handling of permissions allows an authenticated user to inherit permissions that grant access to sensitive files, bypassing intended access restrictions. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality with high impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require configuration changes or awaiting vendor updates. This vulnerability is critical to address in environments where IBM Storage Scale is used to store sensitive data, especially in multi-tenant or shared environments where users have different access levels.
Potential Impact
For European organizations, the impact of CVE-2025-36104 can be significant, particularly for enterprises relying on IBM Storage Scale for large-scale data storage and file sharing. The vulnerability allows authenticated users to access sensitive information beyond their authorization, potentially leading to data breaches involving confidential business information, personal data protected under GDPR, or intellectual property. This unauthorized data exposure can result in regulatory penalties, reputational damage, and loss of customer trust. Since the vulnerability does not affect data integrity or availability, the primary concern is confidentiality. However, the ease of exploitation by any authenticated user within the network increases the risk, especially in environments with many users or insufficient network segmentation. European organizations in sectors such as finance, healthcare, manufacturing, and government, which often handle sensitive data and comply with strict data protection regulations, are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation before attackers develop or deploy exploit code.
Mitigation Recommendations
To mitigate CVE-2025-36104, European organizations should implement the following specific measures: 1) Review and tighten SMB share permissions on IBM Storage Scale systems to ensure that permission inheritance does not grant excessive access rights. This includes auditing current ACLs (Access Control Lists) and removing unnecessary inherited permissions. 2) Enforce the principle of least privilege by restricting authenticated user access to only those shares and files necessary for their roles. 3) Segment the network to limit SMB access to trusted users and systems, reducing the attack surface. 4) Monitor SMB traffic and access logs for unusual or unauthorized file access attempts, enabling early detection of exploitation attempts. 5) Engage with IBM support or security advisories to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Consider disabling SMB protocol versions or features that are not required or known to be vulnerable, if feasible within the operational environment. 7) Educate system administrators and users about the risks associated with SMB permissions and the importance of secure configuration. These targeted actions go beyond generic advice by focusing on permission inheritance and SMB-specific controls relevant to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36104: CWE-277 Insecure Inherited Permissions in IBM Storage Scale
Description
IBM Storage Scale 5.2.3.0 and 5.2.3.1 could allow an authenticated user to obtain sensitive information from files due to the insecure permissions inherited through the SMB protocol.
AI-Powered Analysis
Technical Analysis
CVE-2025-36104 is a medium-severity vulnerability affecting IBM Storage Scale versions 5.2.3.0 and 5.2.3.1. The vulnerability arises from insecure inherited permissions through the SMB (Server Message Block) protocol, which is used for network file sharing. Specifically, an authenticated user with legitimate access to the system can exploit this flaw to obtain sensitive information from files that they should not normally be able to access. The root cause is related to CWE-277, which concerns improper access control due to insecure permission inheritance. In this case, the SMB protocol's handling of permissions allows an authenticated user to inherit permissions that grant access to sensitive files, bypassing intended access restrictions. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality with high impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require configuration changes or awaiting vendor updates. This vulnerability is critical to address in environments where IBM Storage Scale is used to store sensitive data, especially in multi-tenant or shared environments where users have different access levels.
Potential Impact
For European organizations, the impact of CVE-2025-36104 can be significant, particularly for enterprises relying on IBM Storage Scale for large-scale data storage and file sharing. The vulnerability allows authenticated users to access sensitive information beyond their authorization, potentially leading to data breaches involving confidential business information, personal data protected under GDPR, or intellectual property. This unauthorized data exposure can result in regulatory penalties, reputational damage, and loss of customer trust. Since the vulnerability does not affect data integrity or availability, the primary concern is confidentiality. However, the ease of exploitation by any authenticated user within the network increases the risk, especially in environments with many users or insufficient network segmentation. European organizations in sectors such as finance, healthcare, manufacturing, and government, which often handle sensitive data and comply with strict data protection regulations, are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation before attackers develop or deploy exploit code.
Mitigation Recommendations
To mitigate CVE-2025-36104, European organizations should implement the following specific measures: 1) Review and tighten SMB share permissions on IBM Storage Scale systems to ensure that permission inheritance does not grant excessive access rights. This includes auditing current ACLs (Access Control Lists) and removing unnecessary inherited permissions. 2) Enforce the principle of least privilege by restricting authenticated user access to only those shares and files necessary for their roles. 3) Segment the network to limit SMB access to trusted users and systems, reducing the attack surface. 4) Monitor SMB traffic and access logs for unusual or unauthorized file access attempts, enabling early detection of exploitation attempts. 5) Engage with IBM support or security advisories to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Consider disabling SMB protocol versions or features that are not required or known to be vulnerable, if feasible within the operational environment. 7) Educate system administrators and users about the risks associated with SMB permissions and the importance of secure configuration. These targeted actions go beyond generic advice by focusing on permission inheritance and SMB-specific controls relevant to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:16.298Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68724affa83201eaacb43c17
Added to database: 7/12/2025, 11:46:07 AM
Last enriched: 7/12/2025, 12:01:24 PM
Last updated: 7/12/2025, 12:01:24 PM
Views: 2
Related Threats
CVE-2025-7476: SQL Injection in code-projects Simple Car Rental System
MediumCVE-2025-7475: SQL Injection in code-projects Simple Car Rental System
MediumCVE-2025-7474: SQL Injection in code-projects Job Diary
MediumCVE-2025-7471: SQL Injection in code-projects Modern Bag
MediumCVE-2025-7470: Unrestricted Upload in Campcodes Sales and Inventory System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.