CVE-2025-33103

8.5 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in IBM TCP/IP Connectivity Utilities for i on IBM i operating systems. An attacker with command line access can exploit this to gain root privileges on the host system. Affected systems include IBM i versions 7.2 through 7.6.

💻 Affected Systems

Products:
  • IBM TCP/IP Connectivity Utilities for i
Versions: 7.2, 7.3, 7.4, 7.5, 7.6
Operating Systems: IBM i
Default Config Vulnerable: ⚠️ Yes
Notes: Requires command line access to the host operating system to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root access, allowing data theft, system modification, persistence, and lateral movement across the network.

🟠

Likely Case

Privilege escalation from a lower-privileged user account to root, enabling unauthorized administrative actions and potential data access.

🟢

If Mitigated

Limited impact if command line access is restricted through proper access controls and network segmentation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing command line access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply PTFs as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7233799

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific PTF numbers
2. Apply required PTFs via IBM i PTF management
3. Restart affected services or system as required

🔧 Temporary Workarounds

Restrict Command Line Access

all

Limit command line access to trusted administrators only

Implement RBAC controls
Use IBM i security settings to restrict command line interfaces

Network Segmentation

all

Isolate IBM i systems from untrusted networks

Configure firewall rules
Implement network segmentation

🧯 If You Can't Patch

  • Implement strict access controls to limit command line access
  • Monitor for privilege escalation attempts and unusual root activity

🔍 How to Verify

Check if Vulnerable:

Check IBM i version and installed PTFs against advisory requirements

Check Version:

DSPPTF LICPGM(5770TC1) or equivalent IBM i commands

Verify Fix Applied:

Verify PTFs listed in IBM advisory are installed and active

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Root access from non-administrative accounts
  • Failed privilege escalation attempts

Network Indicators:

  • Unusual command line access patterns
  • Suspicious administrative activity

SIEM Query:

Search for privilege escalation events or root access from non-admin accounts

🔗 References

📤 Share & Export