{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:26:32.700","vulnerabilities":[{"cve":{"id":"CVE-2025-0160","sourceIdentifier":"psirt@us.ibm.com","published":"2025-02-28T19:15:36.393","lastModified":"2025-08-18T18:21:59.430","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1)  could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service."},{"lang":"es","value":"IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 a 8.5.0.13, 8.5.1.0, 8.5.2.0 a 8.5.2.3, 8.5.3.0 a 8.5.3.1, 8.5.4.0, 8.6.0.0 a 8.6.0.5, 8.6.1.0, 8.6.2.0 a 8.6.2.1, 8.6.3.0, 8.7.0.0 a 8.7.0.2, 8.7.1.0, 8.7.2.0 a 8.7.2.1) podría permitir que un atacante remoto con acceso al sistema ejecute código Java arbitrario debido a restricciones inadecuadas en el servicio RPCAdapter."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-114"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5","versionEndExcluding":"8.5.0.14","matchCriteriaId":"53306313-B866-4EE7-AB3C-FA8E6C020E5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5.2.0","versionEndIncluding":"8.5.2.3","matchCriteriaId":"6CFABC40-3A05-4932-BDBE-44F3F764BEA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*","versionStartIncluding":"8.6.0.0","versionEndExcluding":"8.6.0.6","matchCriteriaId":"3F62C6AC-E55E-4B0E-9E82-B3ACBE5813A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0.0","versionEndExcluding":"8.7.0.3","matchCriteriaId":"E0107779-1EF3-4235-AC4A-497873B2FDDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"CB1B622C-6334-4AA4-AF60-69AEAADF9E23"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.5.3.0:*:*:*:*:*:*:*","matchCriteriaId":"CAEC7842-7D7D-4D78-B017-C507DFEA11AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"AC3CD809-194E-4413-8F9A-95CB84D32171"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.5.4.0:*:*:*:*:*:*:*","matchCriteriaId":"C50BA8E4-CB24-4AE3-BAC1-1AF4ED7D8D6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.6.1.0:*:*:*:*:*:*:*","matchCriteriaId":"EE7DA013-A9EC-4B48-910A-7FBF732CC911"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.6.2.0:*:*:*:*:*:*:*","matchCriteriaId":"018447CD-A245-458F-AF29-9BDD6FBB9D87"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.6.2.1:*:*:*:*:*:*:*","matchCriteriaId":"ED71E5AF-8688-4E56-90D8-C7ADE1CE639F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.6.3.0:*:*:*:*:*:*:*","matchCriteriaId":"186BA56B-251C-4B47-8AC4-6D5ADA615F46"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.7.1.0:*:*:*:*:*:*:*","matchCriteriaId":"E12C7956-C1FC-41EA-A3C1-D150A703CE5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.7.2.0:*:*:*:*:*:*:*","matchCriteriaId":"62C74286-EE16-4DE0-B170-0928639749A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_virtualize:8.7.2.1:*:*:*:*:*:*:*","matchCriteriaId":"81385378-8E72-4966-9126-05CD1D65F89C"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7184182","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}