Update: Admin account built into IBM Storage Protect jeopardizes systems

In addition to IBM's Storage Protect data storage solution, the InfoSphere Information Server data integration platform is also vulnerable.

listen Print view
Update image with stripes

(Image: Artur Szczybylo/Shutterstock.com)

2 min. read

Attackers can target IBM Storage Protect and InfoSphere Information Server. Security updates closed several software vulnerabilities.

In a warning message, the developers explain that attackers can gain extensive access to instances via an obviously undocumented admin account. It can be assumed that attackers compromise instances after bypassing the login. The vulnerability (CVE-2025-3319) is classified as “high” threat level. It is not yet clear how such an attack could take place. It is also currently unknown which parameters admins can use to identify systems that have already been successfully attacked.

Issues 8.1.0.000 up to and including 8.1.26.000 under AIX Linux Windows are said to be threatened by the security problem. The developers state that they have closed the gap in version 8.1.27. Even if there are currently no reports of attacks, admins should not wait too long to install the security update.

InfoSphere Information Server is vulnerable via two vulnerabilities(CVE-2025-3221 “high”, CVE-2025-3629 “medium”). Attackers can use these vulnerabilities to trigger DoS states or delete user comments. According to the developers, versions 11.7.0.0 up to and including 11.7.1.6 are affected by both vulnerabilities. IBM links to the security patches for the vulnerable versions in a post.

Videos by heise

Just recently, a “critical” malware vulnerability (CVE-2025-33117) in IBM's IT security solution QRadar SIEM made the headlines.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.