CVE-2024-25021

8.4 HIGH

📋 TL;DR

This vulnerability in IBM AIX 7.3 and VIOS 4.1's Perl implementation allows a non-privileged local user to execute arbitrary commands with elevated privileges. It affects systems running these specific IBM operating system versions where Perl is installed and accessible to local users.

💻 Affected Systems

Products:
  • IBM AIX
  • IBM VIOS
Versions: AIX 7.3, VIOS 4.1
Operating Systems: IBM AIX, IBM VIOS
Default Config Vulnerable: ⚠️ Yes
Notes: Perl must be installed and accessible to local users. The vulnerability is in the Perl implementation provided by IBM for these operating systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root/system administrator, allowing complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local user gains unauthorized administrative privileges, potentially accessing sensitive data, modifying system configurations, or disrupting services.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and Perl usage is monitored/restricted.

🌐 Internet-Facing: LOW (requires local access to exploit)
🏢 Internal Only: HIGH (any authenticated local user could potentially exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of the vulnerability. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM security bulletin fixes for AIX 7.3 and VIOS 4.1

Vendor Advisory: https://www.ibm.com/support/pages/node/7122628

Restart Required: Yes

Instructions:

1. Review IBM security bulletin. 2. Download appropriate fix from IBM Fix Central. 3. Apply fix using smitty or installp command. 4. Reboot system as required.

🔧 Temporary Workarounds

Restrict Perl access

linux

Remove execute permissions from Perl for non-privileged users

chmod 750 /usr/bin/perl
chmod 750 /usr/opt/perl5/bin/perl

Remove Perl if not needed

linux

Uninstall Perl if not required for system functionality

installp -u perl.rte

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor for suspicious Perl process execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check OS version with 'oslevel -s' and verify Perl is installed with 'lslpp -l | grep perl'

Check Version:

oslevel -s

Verify Fix Applied:

Check installed fixes with 'instfix -i | grep IXxxxxx' (replace with actual fix ID from IBM bulletin)

📡 Detection & Monitoring

Log Indicators:

  • Unusual Perl process execution by non-privileged users
  • Privilege escalation attempts in system logs

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

source="aix_system_logs" AND (process="perl" AND user!="root")

🔗 References

📤 Share & Export