PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9005 IBM CVE debrief

CVE-2016-9005 is a critical IBM System Storage TS3100-TS3200 Tape Library vulnerability that, according to the CVE/NVD record, could allow an unauthenticated user with access to the company network to change a user's password and gain remote access to the system. NVD rates the issue CVSS 3.0 9.8 (Critical) and maps it to CWE-284 (Improper Access Control).

Vendor
IBM
Product
CVE-2016-9005
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-08
Original CVE updated
2026-05-13
Advisory published
2017-02-08
Advisory updated
2026-05-13

Who should care

Organizations that operate IBM System Storage TS3100-TS3200 Tape Library systems, especially any environment where the management interface is reachable from internal networks, should treat this as high priority. Network defenders, storage administrators, and vulnerability management teams should verify whether affected versions are present and whether vendor remediation has been applied.

Technical summary

The NVD record identifies affected IBM System Storage TS3100-TS3200 Tape Library versions up to d.60. The reported impact is unauthorized password change followed by remote access, which aligns with the high confidentiality, integrity, and availability impact reflected in the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The weakness class is CWE-284, indicating access control failure rather than a flaw that requires prior authentication.

Defensive priority

Critical. The combination of unauthenticated network access, password change capability, and remote access potential makes this a high-risk exposure for any reachable affected device.

Recommended defensive actions

  • Confirm whether any IBM System Storage TS3100-TS3200 Tape Library devices are deployed and compare installed firmware against the affected range identified in NVD (versions through d.60).
  • Apply IBM's vendor guidance and remediation referenced in the advisory for CVE-2016-9005.
  • Restrict network exposure of management interfaces to trusted administrative networks only, and verify segmentation is in place around storage management paths.
  • Review device access controls and administrative account handling for unexpected password changes or unauthorized access attempts.
  • Monitor for related authentication or configuration anomalies on affected systems until remediation is complete.

Evidence notes

The description, impact statement, CVSS score, and weakness classification are taken from the supplied NVD record for CVE-2016-9005. The vendor advisory reference from IBM and the SecurityFocus BID entry corroborate that IBM issued guidance for this issue. The published date used here is the CVE/NVD publication timestamp supplied in the corpus (2017-02-08T22:59:00.697Z); the later modified timestamp is not treated as the issue date.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-08. The supplied record was modified on 2026-05-13, but that is not the issue date. No CISA KEV entry was supplied in the corpus.