CVE-2025-33112

8.4 HIGH

📋 TL;DR

This vulnerability in IBM AIX and VIOS Perl implementations allows a local non-privileged user to execute arbitrary code by exploiting improper pathname input sanitization. The flaw enables privilege escalation and system compromise on affected systems running vulnerable versions. Only local users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM AIX
  • IBM VIOS
Versions: AIX 7.3, VIOS 4.1.1
Operating Systems: IBM AIX, IBM VIOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Perl installed and accessible to local users. VIOS is Virtual I/O Server for Power Systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, complete system compromise, installation of persistent backdoors, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Local user gains elevated privileges, modifies system files, accesses sensitive data, and potentially disrupts system operations.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and segmentation preventing lateral movement and data access.

🌐 Internet-Facing: LOW - Requires local user access, not remotely exploitable.
🏢 Internal Only: HIGH - Local users on affected systems can exploit this for privilege escalation and system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access and knowledge of vulnerable Perl functions. Path traversal techniques likely involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply AIX 7.3 TL5 SP2 or later, VIOS 4.1.1.10 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7236103

Restart Required: Yes

Instructions:

1. Download appropriate fix from IBM Fix Central. 2. Apply interim fix or service pack. 3. Reboot system. 4. Verify patch installation with 'oslevel -s' or 'ioslevel'.

🔧 Temporary Workarounds

Restrict Perl access

aix

Remove execute permissions from Perl for non-privileged users or restrict access to vulnerable Perl modules.

chmod 750 /usr/bin/perl
chmod 750 /usr/opt/perl5/bin/perl

Implement strict path controls

aix

Use chroot or filesystem restrictions to limit path traversal capabilities.

🧯 If You Can't Patch

  • Implement strict user access controls and privilege separation
  • Monitor for suspicious Perl process execution and file access patterns

🔍 How to Verify

Check if Vulnerable:

Check system version: 'oslevel -s' for AIX or 'ioslevel' for VIOS. Verify if running vulnerable versions.

Check Version:

oslevel -s (AIX) or ioslevel (VIOS)

Verify Fix Applied:

Verify patch installation: 'instfix -i | grep -i perl' and check version matches patched levels.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Perl process execution by non-privileged users
  • Path traversal attempts in system logs
  • Unexpected file access patterns from Perl processes

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="aix_system_logs" AND process="perl" AND user!="root" AND (command CONTAINS "../" OR command CONTAINS "path")

🔗 References

📤 Share & Export