Cyber Posture

CVE-2025-14604

MediumLPE

Published: 03 March 2026

Published
03 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0000 0.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14604 is a medium-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Ibm Storage Scale. Its CVSS base score is 6.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-732

Procedures support proper permission assignment for critical resources through documented controls.

addresses: CWE-732

Attribute management for resources provides a mechanism to assign and maintain correct permissions based on security labels.

addresses: CWE-732

Prevents overly permissive assignments to critical resources by limiting to task needs.

addresses: CWE-732

Training policy covers correct permission assignment, reducing the ability to exploit incorrect permission assignments for critical resources.

addresses: CWE-732

Training on permission management reduces incorrect permission assignments for critical resources.

addresses: CWE-732

Audit logs and logging tools are critical resources whose protection requires correct permission assignments to block unauthorized actions.

addresses: CWE-732

Assessments review permission assignments on critical resources to confirm correctness, mitigating exploitation via incorrect permissions.

addresses: CWE-732

Certification includes checking that permissions on critical resources are correctly assigned.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Incorrect permission assignment (CWE-732) allows low-privileged local users to trigger elevated execution of resources, directly enabling local privilege escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Storage Scale IBM S through rage Scale 5.2.3.0 - 5.2.3.5, and IBM S through rage Scale 6.0.0.0 - 6.0.0.1 could allow a local user to unintentionally trigger additional permissions for resources in a way that allows that resource to…

more

be executed by unintended actors.

Deeper analysisAI

CVE-2025-14604 is a vulnerability in IBM Storage Scale (versions 5.2.3.0 through 5.2.3.5 and 6.0.0.0 through 6.0.0.1) stemming from incorrect permission assignment (CWE-732). It allows a local user to unintentionally trigger additional permissions for resources, enabling those resources to be executed by unintended actors. The issue has a CVSS v3.1 base score of 6.6 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N), indicating medium severity with high impacts on confidentiality and integrity but no availability disruption.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity, though it requires user interaction (UI:R). Successful exploitation enables the attacker to execute resources with elevated permissions unintended for their access level, potentially leading to unauthorized data access (high confidentiality impact) and modification (high integrity impact).

IBM has published an advisory with details on mitigation and patches at https://www.ibm.com/support/pages/node/7262312. Security practitioners should consult this reference for version-specific remediation steps.

Details

CWE(s)

Affected Products

ibm
storage scale
5.2.3.0 — 5.2.3.6 · 6.0.0.0 — 6.0.0.2

CVEs Like This One

CVE-2026-2311Same vendor: Ibm
CVE-2024-49814Same vendor: Ibm
CVE-2025-36184Same vendor: Ibm
CVE-2026-6389Same vendor: Ibm
CVE-2026-2637Shared CWE-732
CVE-2026-24834Shared CWE-732
CVE-2025-12985Shared CWE-732
CVE-2025-21571Shared CWE-732
CVE-2025-0161Same vendor: Ibm
CVE-2025-36418Same vendor: Ibm

References