{"vulnerability": "CVE-2025-0159", "sightings": [{"uuid": "bc9171f8-ed05-474f-b288-48fd44a7d7e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll5gejn6j52h", "content": "", "creation_timestamp": "2025-03-24T18:50:46.696580Z"}, {"uuid": "32d05d44-ccf5-403d-9353-550f239285a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114083131418296123", "content": "", "creation_timestamp": "2025-02-28T19:20:38.917443Z"}, {"uuid": "b87fbee6-9dae-4299-89ee-ac99a79d929d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljb7jdlr5422", "content": "", "creation_timestamp": "2025-02-28T20:08:31.487178Z"}, {"uuid": "88580e35-2d3b-4724-9dcf-1ef74d54a3e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-0159", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114083422313105305", "content": "", "creation_timestamp": "2025-02-28T20:34:37.143580Z"}, {"uuid": "32aede2f-dd3a-47df-86f3-0de45ba7ffd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083713468949190", "content": "", "creation_timestamp": "2025-02-28T21:48:46.659332Z"}, {"uuid": "34eea385-a6cb-4c97-a754-5d424646805b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljtswzxi3s2i", "content": "", "creation_timestamp": "2025-03-08T05:44:06.145439Z"}, {"uuid": "28e95ccf-7d2c-466a-b5d3-30116fad20d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114085779668413484", "content": "", "creation_timestamp": "2025-03-01T06:34:13.382459Z"}, {"uuid": "8cb4c1e0-ce7f-42ef-b725-b296560cad2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljjnlxhtul2q", "content": "", "creation_timestamp": "2025-03-04T04:41:46.506959Z"}, {"uuid": "af14224f-fc40-4955-b63a-1bf9e40572cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljv5qzctkm2k", "content": "", "creation_timestamp": "2025-03-08T18:30:13.369595Z"}, {"uuid": "b146b13c-e1ea-4d9d-a884-1869b218057c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-0159", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljjowqe54c24", "content": "", "creation_timestamp": "2025-03-04T05:05:41.601282Z"}, {"uuid": "653b316a-c526-4fdf-aec6-b24ef695a062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "7517d5a8-b981-4ece-a308-4fc67f8ea9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://t.me/cvedetector/19179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0159 - IBM FlashSystem Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0159 \nPublished : Feb. 28, 2025, 7:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T22:03:00.000000Z"}, {"uuid": "d72a6982-db64-4043-94a0-d9ceaf54c87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5955", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0159\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request.\n\ud83d\udccf Published: 2025-02-28T19:01:26.669Z\n\ud83d\udccf Modified: 2025-02-28T19:01:26.669Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7184182", "creation_timestamp": "2025-02-28T19:26:58.000000Z"}, {"uuid": "e4536ca0-c2cd-4521-92de-f8ef1ddae0a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "https://t.me/DarkWebInformer_News/1362", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-0159: Vulnerabilities in the GUI affect IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products\nLink: https://darkwebinformer.com/cve-2025-0159-vulnerabilities-in-the-gui-affect-ibm-san-volume-controller-ibm-storwize-ibm-spectrum-virtualize-and-ibm-flashsystem-products/", "creation_timestamp": "2025-02-28T20:35:08.000000Z"}, {"uuid": "32a55680-59b9-4c7e-b05b-f1e8aa152e64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0159", "type": "seen", "source": "Telegram/wftFdiDrjn7CsvCgIVhoiTGeSzq-Q2aweKXgyD4rMkctzLY", "content": "", "creation_timestamp": "2025-02-28T20:30:38.000000Z"}]}