IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view, overwrite, or append to arbitrary files on the system.
Advisories

No advisories yet.

Fixes

Solution

Remediation/Fixes IBM strongly recommends addressing the vulnerability by following the steps provided in the following technote: Remediation of CVE-2025-3355 and CVE-2025-3356


Workaround

No workaround given by the vendor.

History

Thu, 30 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 19:30:00 +0000

Type Values Removed Values Added
Description IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view, overwrite, or append to arbitrary files on the system.
Title IBM Tivoli Monitoring is vulnerable to unauthenticated file read and write operations
First Time appeared Ibm
Ibm tivoli Monitoring
Weaknesses CWE-22
CPEs cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp21:*:*:*:*:*:*
Vendors & Products Ibm
Ibm tivoli Monitoring
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2025-10-30T19:41:12.149Z

Reserved: 2025-04-06T21:05:59.220Z

Link: CVE-2025-3356

cve-icon Vulnrichment

Updated: 2025-10-30T19:41:09.705Z

cve-icon NVD

Status : Received

Published: 2025-10-30T20:15:38.830

Modified: 2025-10-30T20:15:38.830

Link: CVE-2025-3356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.