Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36120: CWE-863 Incorrect Authorization in IBM Storage Virtualize

0
High
VulnerabilityCVE-2025-36120cvecve-2025-36120cwe-863
Published: Mon Aug 18 2025 (08/18/2025, 13:39:41 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Storage Virtualize

Description

IBM Storage Virtualize 8.4, 8.5, 8.6, and 8.7 could allow an authenticated user to escalate their privileges in an SSH session due to incorrect authorization checks to access resources.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:45:31 UTC

Technical Analysis

CVE-2025-36120 is an authorization vulnerability classified under CWE-863 affecting IBM Storage Virtualize versions 8.4, 8.5, 8.6, and 8.7. The flaw arises from incorrect authorization checks within the SSH session management component, allowing an authenticated user to escalate their privileges beyond intended limits. Specifically, the vulnerability permits users with legitimate credentials to access or manipulate resources that should be restricted, effectively bypassing security controls designed to enforce role-based access. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of a low-level authenticated user (PR:L) without any additional user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for full system compromise or data breach. No public exploits have been reported yet, but the vulnerability's presence in widely deployed enterprise storage virtualization products makes it a critical concern. IBM has not yet published patches, so organizations must rely on compensating controls until updates are available. The vulnerability underscores the importance of robust authorization mechanisms in storage management software, especially those accessible via network protocols like SSH.

Potential Impact

The vulnerability allows an authenticated user to escalate privileges, potentially gaining unauthorized access to sensitive storage resources. This can lead to data breaches, unauthorized data modification or deletion, and disruption of storage services, severely impacting business continuity. Given IBM Storage Virtualize's role in consolidating and managing enterprise storage, exploitation could compromise critical infrastructure, affecting multiple systems and users. The high CVSS score indicates that attackers can remotely exploit this flaw with relative ease once authenticated, increasing the risk of insider threats or credential compromise being leveraged for broader attacks. Organizations relying on these IBM products may face operational downtime, data loss, regulatory penalties, and reputational damage if exploited. The lack of known exploits currently provides a window for proactive defense, but the vulnerability's severity demands urgent attention.

Mitigation Recommendations

1. Restrict SSH access to IBM Storage Virtualize management interfaces to trusted IP addresses and networks using firewall rules and network segmentation. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3. Monitor logs and audit trails for unusual privilege escalation attempts or anomalous SSH session activities. 4. Implement the principle of least privilege by limiting user roles and permissions strictly to necessary functions. 5. Regularly review and update user access rights to remove unnecessary or outdated accounts. 6. Apply vendor patches promptly once IBM releases updates addressing this vulnerability. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious behavior related to privilege escalation. 8. Conduct security awareness training for administrators to recognize and respond to potential exploitation attempts. 9. If patching is delayed, consider temporary measures such as disabling SSH access where feasible or using alternative secure management channels.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:18.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a32efdad5a09ad00ae96f2

Added to database: 8/18/2025, 1:47:41 PM

Last enriched: 2/27/2026, 1:45:31 AM

Last updated: 3/26/2026, 3:52:49 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses