IBM TSSC/TS4500 IMC <=9.6 Unauth Cmd Exec via Input Validation
CVE-2026-5935 Published on April 22, 2026

TSSC/IMC is vulnerable to OS Command Injection
IBM Total Storage Service Console (TSSC) / TS4500 IMC 9.2, 9.3, 9.4, 9.5, 9.6 TSSC/IMC could allow an unauthenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2026-5935 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2026-5935 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2026-5935

Want to know whenever a new CVE is published for IBM Total Storage Service Console Tssc Ts4500 Imc? stack.watch will email you.

 

Affected Versions

IBM Total Storage Service Console (TSSC) / TS4500 IMC: