Metrics
Affected Vendors & Products
No advisories yet.
Solution
Remediation/Fixes IBM strongly recommends addressing the vulnerability by following the steps provided in the following technote: Remediation of CVE-2025-3355 and CVE-2025-3356
Workaround
No workaround given by the vendor.
| Link | Providers | 
|---|---|
| https://www.ibm.com/support/pages/node/7249694 |     | 
Thu, 30 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 30 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. | |
| Title | IBM Tivoli Monitoring is vulnerable to unauthenticated file read and write operations | |
| First Time appeared | Ibm Ibm tivoli Monitoring | |
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:* cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp21:*:*:*:*:*:* | |
| Vendors & Products | Ibm Ibm tivoli Monitoring | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-10-30T19:51:08.264Z
Reserved: 2025-04-06T21:02:26.939Z
Link: CVE-2025-3355
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-30T19:51:03.509Z
 NVD
                        NVD
                    Status : Received
Published: 2025-10-30T20:15:38.673
Modified: 2025-10-30T20:15:38.673
Link: CVE-2025-3355
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.