Description
IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
Published: 2026-04-01
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Database compromise leading to data loss or corruption
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a SQL injection flaw in IBM Storage Protect Server 8.2.0 that allows a malicious actor to execute arbitrary SQL statements against the back‑end database. This can enable the attacker to view, add, modify, or delete sensitive data, compromising both confidentiality and integrity of the system’s information. The weakness is classified as CWE‑89.

Affected Systems

IBM Storage Protect Server versions 8.1.0.000 through 8.2.0.xxx and 8.2.1 on AIX Linux and Windows are impacted. The vulnerable endpoint is a JSON‑RPC service exposed by the product, and the vulnerability requires an authenticated session to access it.

Risk and Exploitability

The vulnerability has a CVSS score of 7.6, indicating high severity, but its EPSS score is below 1 % and it does not appear in the CISA KEV catalog, suggesting that exploitation is unlikely at present. The attack vector is remote via the JSON‑RPC endpoint, and the attacker must first authenticate, indicating that the risk is limited to authorized users who could be compromised or granted privileges. Once authenticated, the attacker can manipulate arbitrary data through the injected SQL statements.

Generated by OpenCVE AI on April 3, 2026 at 00:21 UTC.

Remediation

Vendor Solution

Affected VersionsFixing LevelPlatformRemediation/Fix/Instructions8.1.0.000 - 8.2.0.xxx8.2.1AIX Linux WindowsInstructions for downloading the update:  https://www.ibm.com/support/pages/node/7266171


OpenCVE Recommended Actions

  • Apply the IBM update provided at https://www.ibm.com/support/pages/node/7266171 to upgrade to a fixed version.

Generated by OpenCVE AI on April 3, 2026 at 00:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ibm storage Protect
Vendors & Products Ibm storage Protect

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Ibm aix
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Ibm aix
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
Title IBM Storage Protect Server is affected by a vulnerability that could allow authenticated users to access administrative metadata through the JSON-RPC endpoint .
First Time appeared Ibm
Ibm storage Protect Server
Weaknesses CWE-89
CPEs cpe:2.3:a:ibm:storage_protect_server:8.2.0:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm storage Protect Server
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Ibm Aix Storage Protect Storage Protect Server
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-04-01T13:20:45.428Z

Reserved: 2025-12-01T20:26:14.425Z

Link: CVE-2025-13855

cve-icon Vulnrichment

Updated: 2026-04-01T13:20:41.696Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T01:16:39.360

Modified: 2026-04-02T20:46:51.677

Link: CVE-2025-13855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:19:16Z

Weaknesses