CVE-2023-45166

8.4 HIGH

📋 TL;DR

A local privilege escalation vulnerability in IBM AIX and VIOS allows non-privileged local users to exploit the piodmgrsu command to gain elevated privileges. This affects IBM AIX 7.2, 7.3, and VIOS 3.1 systems. Attackers can leverage this to obtain root-level access on vulnerable systems.

💻 Affected Systems

Products:
  • IBM AIX
  • IBM VIOS
Versions: AIX 7.2, 7.3; VIOS 3.1
Operating Systems: IBM AIX, IBM VIOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where piodmgrsu command is present and accessible to non-privileged users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root access, allowing attackers to install persistent backdoors, exfiltrate sensitive data, or pivot to other systems.

🟠

Likely Case

Local attackers gain root privileges, enabling them to bypass security controls, access restricted data, and modify system configurations.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though privilege escalation still poses significant risk.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local user access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Any compromised local account can escalate to root, making this critical for internal systems with multiple users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access but appears to be straightforward exploitation based on the CVSS score and description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest security updates from IBM

Vendor Advisory: https://www.ibm.com/support/pages/node/7095022

Restart Required: Yes

Instructions:

1. Check current AIX/VIOS version. 2. Download and apply the appropriate security update from IBM Fix Central. 3. Reboot the system to ensure patches are fully applied.

🔧 Temporary Workarounds

Restrict piodmgrsu command access

linux

Remove execute permissions from piodmgrsu for non-privileged users

chmod 750 /usr/sbin/piodmgrsu

Implement strict access controls

all

Use role-based access control to limit who can execute privileged commands

🧯 If You Can't Patch

  • Implement strict user access controls and monitor for suspicious privilege escalation attempts
  • Isolate affected systems from critical network segments and implement additional monitoring

🔍 How to Verify

Check if Vulnerable:

Check if piodmgrsu command exists and is accessible to non-root users: ls -la /usr/sbin/piodmgrsu

Check Version:

oslevel -s

Verify Fix Applied:

Verify the security update has been applied using oslevel -s command and check piodmgrsu permissions

📡 Detection & Monitoring

Log Indicators:

  • Unusual piodmgrsu command execution by non-privileged users
  • Sudden privilege escalation events
  • Failed sudo/su attempts followed by successful piodmgrsu execution

Network Indicators:

  • None - this is a local exploit

SIEM Query:

search 'piodmgrsu' AND (user!=root OR uid!=0)

🔗 References

📤 Share & Export