Metrics
Affected Vendors & Products
No advisories yet.
Solution
DS8A00 fixes are delivered in Microcode Bundle 10.11.30.0 R10.1.1 DS8900F fixes are delivered in Microcode Bundle 89.44.17.0 R9.4 SP4.2 DS8A00 customers should either schedule Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support, and request that 10.11.30.0 be applied to their systems.DS8900F customers should either schedule Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support, and request that 89.44.17.0 be applied to their systems. ICS Installation Guidelines: The ICS(es) listed below remediate critical severity vulnerabilities a) ICS CVE_4Q2025_v1.0.iso includes remediation for CVE-2024-52533 , CVE-2025-49796 , CVE-2025-49794 and is available for DS8900F and DS8A00. b) ICS CVE_4Q2025_v1.1.iso includes remediation for CVE-2025-23048 and is available for DS8900F and DS8A00. DS8900Fsystem with R9.4 LIC bundle but below 89.44.17.0 or DS8A00 with R10.0 LIC bundle but below 10.11.30.0 are recommended to install both of the above mentioned ICS(es). Customers should should either contact Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support to load the above mentioned ICS(es). Note: The above ICS(es) are not supported for DS8900F with LIC bundle below R9.4. Customers should either contact Remote Code Load (RCL) via https://www.ibm.com/support/pages/ibm-remote-code-load or contact IBM support to load the recommended or latest LIC bundle on the DS8900F system.
Workaround
DS8900F and DS8A00 commonly known as DS8K is installed in client data center and clients control access to the system. DS8K offers multiple security features like LDAP, Multi-factor authentication, audit logging etc., that allows clients to control and audit personnel access to their DS8K. In addition, DS8K has implemented IBM approved challenge-response system to control IBM service personnel accessing the system either locally or remotely. So, a malicious attacker must meticulously bypass multiple layers of authentication by exploiting known open-source vulnerabilities to gain access to DS8K. The first step would be gaining access through the client infrastructure. While the issue must be mitigated at the earliest, it doesn’t pose an immediate vulnerability due to existing access controls implemented in DS8K. In addition, DS8K supports deployment of code fixes either via remote code load process or locally by IBM personnel. DS8K clients can deploy code fixes too.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7255039 |
|
Fri, 26 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms. | |
| Title | Missing Authorization with the DS8900F and DS8A00 Hardware Management Console | |
| First Time appeared |
Ibm
Ibm ds8900f Firmware |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:o:ibm:ds8900f_firmware:10.1.3.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:ds8900f_firmware:10.10.106.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:ds8900f_firmware:10.2.45.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:ds8900f_firmware:89.42.18.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:ds8900f_firmware:89.44.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm ds8900f Firmware |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-12-26T15:15:11.888Z
Reserved: 2025-04-15T21:16:24.268Z
Link: CVE-2025-36192
Updated: 2025-12-26T15:14:06.685Z
Status : Received
Published: 2025-12-26T14:15:58.507
Modified: 2025-12-26T14:15:58.507
Link: CVE-2025-36192
No data.
OpenCVE Enrichment
No data.