{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2141","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2025-03-10T03:07:42.777Z","datePublished":"2025-07-01T01:01:51.136Z","dateUpdated":"2025-08-24T11:34:35.439Z"},"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3948-VEF:*:*:*:*:*:*:*","cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3948-VED:*:*:*:*:*:*:*","cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3957-VED:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","platforms":["3948-VEF"],"product":"System Storage Virtualization Engine TS7700","vendor":"IBM","versions":[{"status":"affected","version":"8.60.0.115"}]},{"defaultStatus":"unaffected","platforms":["3948-VED"],"product":"System Storage Virtualization Engine TS7700","vendor":"IBM","versions":[{"status":"affected","version":"8.54.2.17, 8.60.0.115"}]},{"defaultStatus":"unaffected","platforms":["3957-VED"],"product":"System Storage Virtualization Engine TS7700","vendor":"IBM","versions":[{"status":"affected","version":"8.54.2.17, 8.60.0.115"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IBM System Storage Virtualization Engine TS7700 3957 VED R5.4 8.54.2.17, R6.0 8.60.0.115, 3948 VED R5.4 8.54.2.17, R6.0 8.60.0.115, and 3948 VEF R6.0 8.60.0.115&nbsp;is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."}],"value":"IBM System Storage Virtualization Engine TS7700 3957 VED R5.4 8.54.2.17, R6.0 8.60.0.115, 3948 VED R5.4 8.54.2.17, R6.0 8.60.0.115, and 3948 VEF R6.0 8.60.0.115 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2025-08-24T11:34:35.439Z"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.ibm.com/support/pages/node/7238556"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IBM strongly recommends addressing the vulnerability now by visiting <a target=\"_blank\" rel=\"nofollow\" href=\"https://tape.ibmrcl.enterpriseappointments.com/v2/\">https://tape.ibmrcl.enterpriseappointments.com/v2/</a> or contacting IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of the appropriate VTD_EXEC as needed. Minimum microcode versions are shown below:<br><br>Machine Type  Model  Release  Fix<br>3957  VED  R5.4  Upgrade to 8.54.2.17 + VTD_EXEC.904<br>- OR -<br>Upgrade to 8.54.1.27 + VTD_EXEC.904<br>R6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905<br>3948  VED  R5.4  Upgrade to 8.54.2.17 + VTD_EXEC.904<br>- OR -<br>Upgrade to 8.54.1.27 + VTD_EXEC.904<br>R6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905<br>3948  VEF  R6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905<br> <br><br>The minimum VTD_EXEC version is shown below:<br><br>VTD_EXEC Package  Version<br>VTD_EXEC.904  v1.27<br>VTD_EXEC.905  v1.11<br> <br><br>Installation Details<br> <br><br>Concurrent  Yes<br>Local Machine State  Online/Offline/Service<br>Remote Machine State  Online/Offline/Service<br>Time of Installation  Anytime<br>Installation Time Required (mins)  60<br><br>"}],"value":"IBM strongly recommends addressing the vulnerability now by visiting  https://tape.ibmrcl.enterpriseappointments.com/v2/  or contacting IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of the appropriate VTD_EXEC as needed. Minimum microcode versions are shown below:\n\nMachine Type  Model  Release  Fix\n3957  VED  R5.4  Upgrade to 8.54.2.17 + VTD_EXEC.904\n- OR -\nUpgrade to 8.54.1.27 + VTD_EXEC.904\nR6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905\n3948  VED  R5.4  Upgrade to 8.54.2.17 + VTD_EXEC.904\n- OR -\nUpgrade to 8.54.1.27 + VTD_EXEC.904\nR6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905\n3948  VEF  R6.0  Upgrade to 8.60.0.115 + VTD_EXEC.905\n \n\nThe minimum VTD_EXEC version is shown below:\n\nVTD_EXEC Package  Version\nVTD_EXEC.904  v1.27\nVTD_EXEC.905  v1.11\n \n\nInstallation Details\n \n\nConcurrent  Yes\nLocal Machine State  Online/Offline/Service\nRemote Machine State  Online/Offline/Service\nTime of Installation  Anytime\nInstallation Time Required (mins)  60"}],"source":{"discovery":"UNKNOWN"},"title":"IBM System Storage Virtualization Engine TS7700 cross-site scripting","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-01T13:35:59.794020Z","id":"CVE-2025-2141","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-01T13:36:06.551Z"}}]}}