CVE-2025-36120
IBM · IBM Multiple Products
A high-severity vulnerability has been identified in multiple IBM storage products utilizing the IBM Storage Virtualize software.
Executive summary
A high-severity vulnerability has been identified in multiple IBM storage products utilizing the IBM Storage Virtualize software. This flaw could allow a remote, unauthenticated attacker to gain complete control over affected storage systems, potentially leading to a severe data breach, data loss, or significant service disruption. Organizations are urged to apply security patches immediately to mitigate this critical risk.
Vulnerability
This vulnerability is a remote code execution (RCE) flaw within the web-based management interface of IBM Storage Virtualize. An unauthenticated attacker can send a specially crafted HTTP request to a vulnerable API endpoint. Due to improper input validation, the request can inject and execute arbitrary commands on the underlying operating system with elevated privileges, granting the attacker full administrative control over the storage appliance.
Business impact
This vulnerability is rated High severity with a CVSS score of 8.8, reflecting a critical risk to the confidentiality, integrity, and availability of an organization's most vital data assets. Successful exploitation could allow an attacker to exfiltrate sensitive data, deploy ransomware, delete or corrupt critical backups and production data, and pivot to other systems within the network. The potential consequences include significant financial loss, regulatory fines, reputational damage, and prolonged operational downtime.
Remediation
Immediate Action: Apply the security updates provided by IBM to all affected systems immediately. Prioritize patching for systems with management interfaces exposed to untrusted networks. After patching, review system and access logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes looking for unusual or anomalous network traffic directed at the storage management interface, unexpected outbound connections from storage appliances, and reviewing audit logs for unauthorized configuration changes, new user account creation, or commands executed outside of normal administrative activity.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the management interface to a dedicated, secure management network or specific authorized IP addresses using firewalls or access control lists (ACLs). Ensure multi-factor authentication (MFA) is enforced for all administrative accounts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 8.8, this vulnerability represents a significant and immediate threat to the organization. We strongly recommend that the remediation plan be executed with the highest priority. All affected IBM Storage Virtualize instances must be identified and patched immediately. Although this CVE is not currently listed on the CISA KEV catalog, its high impact and potential for remote exploitation make it a prime candidate for future inclusion and a likely target for threat actors.