2025-12-26 13:58CVE-2025-36192ibm
PUBLISHED5.2Operating systemCWE-862

Missing Authorization with the DS8900F and DS8A00 Hardware Management Console

IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.

Problem type

Affected products

IBM

DS8A00( R10.1)

10.10.106.0 - AFFECTED

DS8A00 ( R10.0)

10.1.3.0 - AFFECTED

10.2.45.0 - AFFECTED

DS8900F ( R9.4)

89.40.83.0 - AFFECTED

89.42.18.0 - AFFECTED

89.44.5.0 - AFFECTED

References

GitHub Security Advisories

GHSA-4gh5-5w79-82mv

IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4)...

https://github.com/advisories/GHSA-4gh5-5w79-82mv

IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-36192
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-36192",
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "dateUpdated": "2025-12-26T15:15:11.888Z",
    "dateReserved": "2025-04-15T21:16:24.268Z",
    "datePublished": "2025-12-26T13:58:51.713Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm",
        "dateUpdated": "2025-12-26T14:00:21.658Z"
      },
      "title": "Missing Authorization with the DS8900F and DS8A00 Hardware Management Console",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "IBM",
          "product": "DS8A00( R10.1)",
          "cpes": [
            "cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:*",
            "cpe:2.3:o:ibm:ds8900f_firmware:89.44.5.0:*:*:*:*:*:*:*",
            "cpe:2.3:o:ibm:ds8900f_firmware:89.42.18.0:*:*:*:*:*:*:*",
            "cpe:2.3:o:ibm:ds8900f_firmware:10.2.45.0:*:*:*:*:*:*:*",
            "cpe:2.3:o:ibm:ds8900f_firmware:10.10.106.0:*:*:*:*:*:*:*",
            "cpe:2.3:o:ibm:ds8900f_firmware:10.1.3.0:*:*:*:*:*:*:*"
          ],
          "versions": [
            {
              "version": "10.10.106.0",
              "status": "affected",
              "versionType": "semver"
            }
          ]
        },
        {
          "vendor": "IBM",
          "product": "DS8A00 ( R10.0)",
          "versions": [
            {
              "version": "10.1.3.0",
              "status": "affected"
            },
            {
              "version": "10.2.45.0",
              "status": "affected"
            }
          ]
        },
        {
          "vendor": "IBM",
          "product": "DS8900F ( R9.4)",
          "versions": [
            {
              "version": "89.40.83.0",
              "status": "affected"
            },
            {
              "version": "89.42.18.0",
              "status": "affected"
            },
            {
              "version": "89.44.5.0",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-862 Missing Authorization",
              "cweId": "CWE-862",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.ibm.com/support/pages/node/7255039",
          "tags": [
            "vendor-advisory",
            "patch"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "attackVector": "LOCAL",
            "attackComplexity": "HIGH",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "DS8900F and DS8A00 commonly known as DS8K is installed in client data center and clients control access to the system. DS8K offers multiple security features like LDAP, Multi-factor authentication, audit logging etc., that allows clients to control and audit personnel access to their DS8K. In addition, DS8K has implemented IBM approved challenge-response system to control IBM service personnel accessing the system either locally or remotely.\n\nSo, a malicious attacker must meticulously bypass multiple layers of authentication by exploiting known open-source vulnerabilities to gain access to DS8K. The first step would be gaining access through the client infrastructure. While the issue must be mitigated at the earliest, it doesn’t pose an immediate vulnerability due to existing access controls implemented in DS8K.\n\nIn addition, DS8K supports deployment of code fixes either via remote code load process or locally by IBM personnel. DS8K clients can deploy code fixes too.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>DS8900F and DS8A00 commonly known as DS8K is installed in client data center and clients control access to the system. DS8K offers multiple security features like LDAP, Multi-factor authentication, audit logging etc., that allows clients to control and audit personnel access to their DS8K. In addition, DS8K has implemented IBM approved challenge-response system to control IBM service personnel accessing the system either locally or remotely.</p><p>So, a malicious attacker must meticulously bypass multiple layers of authentication by exploiting known open-source vulnerabilities to gain access to DS8K. The first step would be gaining access through the client infrastructure. While the issue must be mitigated at the earliest, it doesn’t pose an immediate vulnerability due to existing access controls implemented in DS8K.</p><p>In addition, DS8K supports deployment of code fixes either via remote code load process or locally by IBM personnel. DS8K clients can deploy code fixes too.</p><br>"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "DS8A00 fixes are delivered in Microcode Bundle 10.11.30.0 R10.1.1\n\n \n\nDS8900F fixes are delivered in Microcode Bundle 89.44.17.0 R9.4 SP4.2\n\n \n\nDS8A00 customers should either schedule Remote Code Load (RCL) via  https://www.ibm.com/support/pages/ibm-remote-code-load  or contact IBM support, and request that 10.11.30.0 be applied to their systems.DS8900F customers should either schedule Remote Code Load (RCL) via  https://www.ibm.com/support/pages/ibm-remote-code-load  or contact IBM support, and request that 89.44.17.0 be applied to their systems.\n\nICS Installation Guidelines:\n\nThe ICS(es) listed below remediate critical severity vulnerabilities\n\na) ICS CVE_4Q2025_v1.0.iso includes remediation for CVE-2024-52533 , CVE-2025-49796 , CVE-2025-49794 and is available for DS8900F and DS8A00.\n\nb) ICS CVE_4Q2025_v1.1.iso includes remediation for CVE-2025-23048 and is available for DS8900F and DS8A00.\n\nDS8900Fsystem with R9.4 LIC bundle but below 89.44.17.0 or DS8A00 with R10.0 LIC bundle but below 10.11.30.0 are recommended to install both of the above mentioned ICS(es). Customers should should either contact Remote Code Load (RCL) via  https://www.ibm.com/support/pages/ibm-remote-code-load  or contact IBM support to load the above mentioned ICS(es).\n\nNote: The above ICS(es) are not supported for DS8900F with LIC bundle below R9.4.\n\nCustomers should either contact Remote Code Load (RCL) via  https://www.ibm.com/support/pages/ibm-remote-code-load  or contact IBM support to load the recommended or latest LIC bundle on the DS8900F system.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p></p><div>DS8A00 fixes are delivered in Microcode Bundle 10.11.30.0 R10.1.1</div><div>&nbsp;</div><div>DS8900F fixes are delivered in Microcode Bundle 89.44.17.0 R9.4 SP4.2</div><div>&nbsp;</div><span style=\"background-color: rgb(255, 255, 255);\">DS8A00 customers should either schedule Remote Code Load (RCL) via </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;or contact IBM support, and request that 10.11.30.0 be applied to their systems.</span><p>DS8900F customers should either schedule Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a>&nbsp;or contact IBM support, and request that 89.44.17.0 be applied to their systems.</p><p>ICS Installation Guidelines:</p><p>The ICS(es) listed below remediate critical severity vulnerabilities</p><p>a) ICS CVE_4Q2025_v1.0.iso includes remediation for CVE-2024-52533 , CVE-2025-49796 , CVE-2025-49794 and is available for DS8900F and DS8A00.</p><p>b) ICS CVE_4Q2025_v1.1.iso includes remediation for CVE-2025-23048 and is available for DS8900F and DS8A00.</p><p>DS8900Fsystem with R9.4 LIC bundle but below 89.44.17.0 or DS8A00 with R10.0 LIC bundle but below 10.11.30.0 are recommended to install both of the above mentioned ICS(es). Customers should should either contact Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a>&nbsp;or contact IBM support to load the above mentioned ICS(es).</p><p>Note: The above ICS(es) are not supported for DS8900F with LIC bundle below R9.4.</p><p>Customers should either contact Remote Code Load (RCL) via <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/ibm-remote-code-load\">https://www.ibm.com/support/pages/ibm-remote-code-load</a>&nbsp;or contact IBM support to load the recommended or latest LIC bundle on the DS8900F system.</p><p></p>"
            }
          ]
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-12-26T15:15:11.888Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}