CVE-2022-22351
📋 TL;DR
This vulnerability in IBM AIX and VIOS allows a non-privileged user on a trusted host to exploit the nimsh daemon to cause denial of service on another trusted host. It affects IBM AIX 7.1, 7.2, 7.3 and VIOS 3.1 systems configured with trusted host relationships.
💻 Affected Systems
- IBM AIX
- IBM VIOS
📦 What is this software?
Aix by Ibm
Aix by Ibm
Aix by Ibm
Aix by Ibm
Aix by Ibm
Aix by Ibm
Aix by Ibm
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of nimsh daemon services across multiple trusted hosts, potentially affecting system management and automation capabilities.
Likely Case
Targeted denial of service against specific nimsh daemons on trusted hosts, disrupting AIX system management operations.
If Mitigated
Limited impact with proper network segmentation and access controls between trusted hosts.
🎯 Exploit Status
Requires non-privileged access on a trusted host, but exploit details not publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AIX: Apply APAR IJ29560; VIOS: Apply APAR IJ29561
Vendor Advisory: https://www.ibm.com/support/pages/node/6561275
Restart Required: Yes
Instructions:
1. Download appropriate fix from IBM Fix Central. 2. Install fix using smitty or installp command. 3. Reboot system to ensure nimsh daemon restarts with patched code.
🔧 Temporary Workarounds
Disable nimsh daemon
aixStop and disable the nimsh daemon if not required for operations
stopsrc -s nimsh
chssys -s nimsh -d
Restrict trusted host access
aixReview and minimize trusted host relationships to only necessary systems
Review /etc/hosts.equiv and ~/.rhosts files
🧯 If You Can't Patch
- Implement strict network segmentation between AIX/VIOS systems
- Monitor nimsh daemon logs for unusual activity and restart if crashes occur
🔍 How to Verify
Check if Vulnerable:
Check AIX version: oslevel -s; Check if nimsh daemon is running: lssrc -s nimsh
Check Version:
oslevel -s
Verify Fix Applied:
Verify APAR applied: instfix -ik IJ29560 (AIX) or instfix -ik IJ29561 (VIOS)
📡 Detection & Monitoring
Log Indicators:
- nimsh daemon crashes in /var/adm/ras/errlog
- Unexpected nimsh process terminations
Network Indicators:
- Unusual traffic patterns between trusted AIX hosts on nimsh port (3901/tcp)
SIEM Query:
source="aix_logs" AND process="nimsh" AND (event="crash" OR event="terminated")