No advisories yet.
Solution
For IBM Storage Scale 5.2.3.0 - 5.2.3.5, IBM strongly recommends addressing the vulnerabilities by upgrading to 5.2.3.6 or later: https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Storage+Scale&release=5.2.3&platform=All&function=all For IBM Storage Scale 6.0.0.0 - 6.0.0.1, IBM strongly recommends addressing the vulnerabilities by upgrading to 6.0.0.2 or later: https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Storage+Scale&release=5.2.3&platform=All&function=all
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7262312 |
|
Tue, 03 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Storage Scale IBM S through rage Scale 5.2.3.0 - 5.2.3.5, and IBM S through rage Scale 6.0.0.0 - 6.0.0.1 could allow a local user to unintentionally trigger additional permissions for resources in a way that allows that resource to be executed by unintended actors. | |
| Title | The following vulnerabilities, which may affect IBM Storage Scale when a directory has a specific ACL composition and could lead to improper execute permissions, have been remediated in Storage Scale versions 5.2.3.6 and 6.0.0.2 | |
| First Time appeared |
Ibm
Ibm storage Scale |
|
| Weaknesses | CWE-732 | |
| CPEs | cpe:2.3:a:ibm:storage_scale:ibm:*:*:*:*:*:*:* cpe:2.3:a:ibm:storage_scale:rage:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm storage Scale |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-03-03T19:49:55.054Z
Reserved: 2025-12-12T18:44:10.536Z
Link: CVE-2025-14604
No data.
Status : Awaiting Analysis
Published: 2026-03-03T20:16:42.600
Modified: 2026-03-03T21:52:29.877
Link: CVE-2025-14604
No data.
OpenCVE Enrichment
No data.