CVE-2024-25050

8.4 HIGH

📋 TL;DR

This vulnerability in IBM i and IBM Rational Development Studio for i allows a local user to execute arbitrary code with administrator privileges due to an unqualified library call. It affects IBM i versions 7.2 through 7.5 and corresponding Rational Development Studio versions. Attackers could gain complete system control on vulnerable systems.

💻 Affected Systems

Products:
  • IBM i
  • IBM Rational Development Studio for i
Versions: 7.2, 7.3, 7.4, 7.5
Operating Systems: IBM i (OS/400)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both the operating system and development environment. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where a local attacker gains administrator privileges, enabling data theft, system modification, persistence, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, access sensitive data, and install malware.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and privilege separation is enforced.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears straightforward based on the CWE-427 description of unqualified library calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM i Group PTFs: SF99738 Level 38 or later for 7.2, SF99739 Level 35 or later for 7.3, SF99740 Level 28 or later for 7.4, SF99741 Level 12 or later for 7.5

Vendor Advisory: https://www.ibm.com/support/pages/node/7149616

Restart Required: Yes

Instructions:

1. Check current PTF levels using DSPPTF. 2. Apply the required Group PTF for your IBM i version. 3. Restart the system as required. 4. For Rational Development Studio, apply corresponding fixes from IBM support.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts and implement strict access controls to reduce attack surface.

Implement privilege separation

all

Ensure users run with minimal necessary privileges using IBM i security features.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor for suspicious privilege escalation attempts and unauthorized library calls

🔍 How to Verify

Check if Vulnerable:

Check IBM i version with 'DSPPTF' command and verify if required Group PTF levels are installed.

Check Version:

DSPPTF (Display PTF) command on IBM i

Verify Fix Applied:

After patching, verify PTF installation with 'DSPPTF' and ensure the system is at the required Group PTF level or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual library calls from user accounts
  • Privilege escalation attempts
  • Unauthorized administrative actions

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for privilege escalation events, unexpected library loads, or administrative actions from non-admin accounts

🔗 References

📤 Share & Export