9.1
CVE-2025-0159
- EPSS 0.1%
- Published 28.02.2025 19:15:36
- Last modified 18.08.2025 18:22:20
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Storage Virtualize Version >= 8.5 < 8.5.0.14
Ibm ≫ Storage Virtualize Version >= 8.5.2.0 <= 8.5.2.3
Ibm ≫ Storage Virtualize Version >= 8.6.0.0 < 8.6.0.6
Ibm ≫ Storage Virtualize Version >= 8.7.0.0 < 8.7.0.3
Ibm ≫ Storage Virtualize Version8.5.1.0
Ibm ≫ Storage Virtualize Version8.5.3.0
Ibm ≫ Storage Virtualize Version8.5.3.1
Ibm ≫ Storage Virtualize Version8.5.4.0
Ibm ≫ Storage Virtualize Version8.6.1.0
Ibm ≫ Storage Virtualize Version8.6.2.0
Ibm ≫ Storage Virtualize Version8.6.2.1
Ibm ≫ Storage Virtualize Version8.6.3.0
Ibm ≫ Storage Virtualize Version8.7.1.0
Ibm ≫ Storage Virtualize Version8.7.2.0
Ibm ≫ Storage Virtualize Version8.7.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.1% | 0.289 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
psirt@us.ibm.com | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.