IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Advisories

No advisories yet.

Fixes

Solution

Remediation/Fixes IBM strongly recommends addressing the vulnerability by following the steps provided in the following technote: Remediation of CVE-2025-3355 and CVE-2025-3356


Workaround

No workaround given by the vendor.

History

Thu, 30 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 19:30:00 +0000

Type Values Removed Values Added
Description IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Title IBM Tivoli Monitoring is vulnerable to unauthenticated file read and write operations
First Time appeared Ibm
Ibm tivoli Monitoring
Weaknesses CWE-22
CPEs cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp21:*:*:*:*:*:*
Vendors & Products Ibm
Ibm tivoli Monitoring
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2025-10-30T19:51:08.264Z

Reserved: 2025-04-06T21:02:26.939Z

Link: CVE-2025-3355

cve-icon Vulnrichment

Updated: 2025-10-30T19:51:03.509Z

cve-icon NVD

Status : Received

Published: 2025-10-30T20:15:38.673

Modified: 2025-10-30T20:15:38.673

Link: CVE-2025-3355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.