9.1
CVE-2025-0159
- EPSS 0.1%
- Veröffentlicht 28.02.2025 19:15:36
- Zuletzt bearbeitet 18.08.2025 18:22:20
- Quelle psirt@us.ibm.com
- Teams Watchlist Login
- Unerledigt Login
IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Storage Virtualize Version >= 8.5 < 8.5.0.14
Ibm ≫ Storage Virtualize Version >= 8.5.2.0 <= 8.5.2.3
Ibm ≫ Storage Virtualize Version >= 8.6.0.0 < 8.6.0.6
Ibm ≫ Storage Virtualize Version >= 8.7.0.0 < 8.7.0.3
Ibm ≫ Storage Virtualize Version8.5.1.0
Ibm ≫ Storage Virtualize Version8.5.3.0
Ibm ≫ Storage Virtualize Version8.5.3.1
Ibm ≫ Storage Virtualize Version8.5.4.0
Ibm ≫ Storage Virtualize Version8.6.1.0
Ibm ≫ Storage Virtualize Version8.6.2.0
Ibm ≫ Storage Virtualize Version8.6.2.1
Ibm ≫ Storage Virtualize Version8.6.3.0
Ibm ≫ Storage Virtualize Version8.7.1.0
Ibm ≫ Storage Virtualize Version8.7.2.0
Ibm ≫ Storage Virtualize Version8.7.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.1% | 0.289 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
psirt@us.ibm.com | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.