8.5
CVE-2025-36355
- EPSS 0.01%
- Veröffentlicht 06.10.2025 16:52:30
- Zuletzt bearbeitet 15.12.2025 19:23:15
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM Security Verify Access code execution
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Security Verify Access Version >= 10.0.0.0 < 10.0.9.0
Ibm ≫ Security Verify Access Version10.0.9.0 Update-
Ibm ≫ Security Verify Access Version10.0.9.0 Updateinterim_fix1
Ibm ≫ Security Verify Access Version10.0.9.0 Updateinterim_fix2
Ibm ≫ Security Verify Access Docker Version >= 10.0.0.0 < 10.0.9.0
Ibm ≫ Security Verify Access Docker Version10.0.9.0 Update-
Ibm ≫ Security Verify Access Docker Version10.0.9.0 Updateinterim_fix1
Ibm ≫ Security Verify Access Docker Version10.0.9.0 Updateinterim_fix2
Ibm ≫ Verify Identity Access Version >= 11.0.0.0 < 11.0.1.0
Ibm ≫ Verify Identity Access Version11.0.1.0 Update-
Ibm ≫ Verify Identity Access Docker Version >= 11.0.0.0 < 11.0.1.0
Ibm ≫ Verify Identity Access Docker Version11.0.1.0 Update-
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.028 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 8.5 | 2.5 | 5.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
|
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.