IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.
PUBLISHED5.2Operating systemCWE-862
Missing Authorization with the DS8900F and DS8A00 Hardware Management Console
Problem type
Affected products
IBM
DS8A00( R10.1)
10.10.106.0 - AFFECTED
DS8A00 ( R10.0)
10.1.3.0 - AFFECTED
10.2.45.0 - AFFECTED
DS8900F ( R9.4)
89.40.83.0 - AFFECTED
89.42.18.0 - AFFECTED
89.44.5.0 - AFFECTED
References
GitHub Security Advisories
GHSA-4gh5-5w79-82mv
IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4)...
https://github.com/advisories/GHSA-4gh5-5w79-82mvIBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-36192Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-36192",
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"dateUpdated": "2025-12-26T15:15:11.888Z",
"dateReserved": "2025-04-15T21:16:24.268Z",
"datePublished": "2025-12-26T13:58:51.713Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm",
"dateUpdated": "2025-12-26T14:00:21.658Z"
},
"title": "Missing Authorization with the DS8900F and DS8A00 Hardware Management Console",
"descriptions": [
{
"lang": "en",
"value": "IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.</p>"
}
]
}
],
"affected": [
{
"vendor": "IBM",
"product": "DS8A00( R10.1)",
"cpes": [
"cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:ds8900f_firmware:89.44.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:ds8900f_firmware:89.42.18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:ds8900f_firmware:10.2.45.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:ds8900f_firmware:10.10.106.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:ds8900f_firmware:10.1.3.0:*:*:*:*:*:*:*"
],
"versions": [
{
"version": "10.10.106.0",
"status": "affected",
"versionType": "semver"
}
]
},
{
"vendor": "IBM",
"product": "DS8A00 ( R10.0)",
"versions": [
{
"version": "10.1.3.0",
"status": "affected"
},
{
"version": "10.2.45.0",
"status": "affected"
}
]
},
{
"vendor": "IBM",
"product": "DS8900F ( R9.4)",
"versions": [
{
"version": "89.40.83.0",
"status": "affected"
},
{
"version": "89.42.18.0",
"status": "affected"
},
{
"version": "89.44.5.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-862 Missing Authorization",
"cweId": "CWE-862",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7255039",
"tags": [
"vendor-advisory",
"patch"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
}
}
],
"workarounds": [
{
"lang": "en",
"value": "DS8900F and DS8A00 commonly known as DS8K is installed in client data center and clients control access to the system. DS8K offers multiple security features like LDAP, Multi-factor authentication, audit logging etc., that allows clients to control and audit personnel access to their DS8K. In addition, DS8K has implemented IBM approved challenge-response system to control IBM service personnel accessing the system either locally or remotely.\n\nSo, a malicious attacker must meticulously bypass multiple layers of authentication by exploiting known open-source vulnerabilities to gain access to DS8K. The first step would be gaining access through the client infrastructure. While the issue must be mitigated at the earliest, it doesn’t pose an immediate vulnerability due to existing access controls implemented in DS8K.\n\nIn addition, DS8K supports deployment of code fixes either via remote code load process or locally by IBM personnel. DS8K clients can deploy code fixes too.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>DS8900F and DS8A00 commonly known as DS8K is installed in client data center and clients control access to the system. DS8K offers multiple security features like LDAP, Multi-factor authentication, audit logging etc., that allows clients to control and audit personnel access to their DS8K. In addition, DS8K has implemented IBM approved challenge-response system to control IBM service personnel accessing the system either locally or remotely.</p><p>So, a malicious attacker must meticulously bypass multiple layers of authentication by exploiting known open-source vulnerabilities to gain access to DS8K. The first step would be gaining access through the client infrastructure. While the issue must be mitigated at the earliest, it doesn’t pose an immediate vulnerability due to existing access controls implemented in DS8K.</p><p>In addition, DS8K supports deployment of code fixes either via remote code load process or locally by IBM personnel. DS8K clients can deploy code fixes too.</p><br>"
}
]
}
],
"solutions": [
{
"lang": "en",
"value": "DS8A00 fixes are delivered in Microcode Bundle 10.11.30.0 R10.1.1\n\n \n\nDS8900F fixes are delivered in Microcode Bundle 89.44.17.0 R9.4 SP4.2\n\n \n\nDS8A00 customers should either schedule Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support, and request that 10.11.30.0 be applied to their systems.DS8900F customers should either schedule Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support, and request that 89.44.17.0 be applied to their systems.\n\nICS Installation Guidelines:\n\nThe ICS(es) listed below remediate critical severity vulnerabilities\n\na) ICS CVE_4Q2025_v1.0.iso includes remediation for CVE-2024-52533 , CVE-2025-49796 , CVE-2025-49794 and is available for DS8900F and DS8A00.\n\nb) ICS CVE_4Q2025_v1.1.iso includes remediation for CVE-2025-23048 and is available for DS8900F and DS8A00.\n\nDS8900Fsystem with R9.4 LIC bundle but below 89.44.17.0 or DS8A00 with R10.0 LIC bundle but below 10.11.30.0 are recommended to install both of the above mentioned ICS(es). Customers should should either contact Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support to load the above mentioned ICS(es).\n\nNote: The above ICS(es) are not supported for DS8900F with LIC bundle below R9.4.\n\nCustomers should either contact Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support to load the recommended or latest LIC bundle on the DS8900F system.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p></p><div>DS8A00 fixes are delivered in Microcode Bundle 10.11.30.0 R10.1.1</div><div> </div><div>DS8900F fixes are delivered in Microcode Bundle 89.44.17.0 R9.4 SP4.2</div><div> </div><span style=\"background-color: rgb(255, 255, 255);\">DS8A00 customers should either schedule Remote Code Load (RCL) via </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a><span style=\"background-color: rgb(255, 255, 255);\"> or contact IBM support, and request that 10.11.30.0 be applied to their systems.</span><p>DS8900F customers should either schedule Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a> or contact IBM support, and request that 89.44.17.0 be applied to their systems.</p><p>ICS Installation Guidelines:</p><p>The ICS(es) listed below remediate critical severity vulnerabilities</p><p>a) ICS CVE_4Q2025_v1.0.iso includes remediation for CVE-2024-52533 , CVE-2025-49796 , CVE-2025-49794 and is available for DS8900F and DS8A00.</p><p>b) ICS CVE_4Q2025_v1.1.iso includes remediation for CVE-2025-23048 and is available for DS8900F and DS8A00.</p><p>DS8900Fsystem with R9.4 LIC bundle but below 89.44.17.0 or DS8A00 with R10.0 LIC bundle but below 10.11.30.0 are recommended to install both of the above mentioned ICS(es). Customers should should either contact Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a> or contact IBM support to load the above mentioned ICS(es).</p><p>Note: The above ICS(es) are not supported for DS8900F with LIC bundle below R9.4.</p><p>Customers should either contact Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a> or contact IBM support to load the recommended or latest LIC bundle on the DS8900F system.</p><p></p>"
}
]
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-26T15:15:11.888Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}