IBM Storage Virtualize 8.4, 8.5, 8.7, and 9.1 IKEv1 implementation allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-36118.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.5.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.7.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.1.0.0"
}
]
}
]