CVE-2025-3473

6.7 MEDIUM

📋 TL;DR

IBM Security Guardium 12.1 contains a local privilege escalation vulnerability where a user with existing local privileges can exploit insecure inherited permissions to gain root access. This affects organizations running IBM Security Guardium 12.1 where local users have some level of system access. The vulnerability stems from improper permission inheritance in the software's installation or configuration.

💻 Affected Systems

Products:
  • IBM Security Guardium
Versions: 12.1
Operating Systems: Linux-based systems running Guardium
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where local users have some level of access to the system. The vulnerability is in how Guardium handles permission inheritance during program execution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious insider or compromised local account could gain full root/administrator control over the Guardium system, allowing complete system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

A local user with legitimate administrative access could escalate to root privileges, potentially bypassing intended access controls and auditing mechanisms.

🟢

If Mitigated

With strict access controls limiting local user accounts and proper monitoring, the impact would be limited to authorized administrative users who might gain additional privileges beyond their intended scope.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access, not directly exploitable over the network.
🏢 Internal Only: HIGH - This poses significant risk to internal systems where local users have access to Guardium installations, particularly in environments with multiple administrators or shared accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing local access to the system. The CWE-277 (Insecure Inherited Permissions) suggests this is likely straightforward for users with some system knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the fix as specified in IBM Security Bulletin CVE-2025-3473

Vendor Advisory: https://www.ibm.com/support/pages/node/7236356

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin CVE-2025-3473
2. Download the appropriate fix from IBM Fix Central
3. Apply the fix following IBM's installation instructions
4. Restart the Guardium services or system as required

🔧 Temporary Workarounds

Restrict Local User Access

linux

Limit local user accounts on Guardium systems to only essential personnel and implement strict access controls.

# Review and remove unnecessary local users
sudo userdel <username>
# Implement sudo restrictions
sudo visudo

Implement File Permission Auditing

linux

Regularly audit file permissions on Guardium installations to detect insecure inherited permissions.

# Check file permissions in Guardium directories
find /opt/IBM/Guardium -type f -exec ls -la {} \; | grep -E '^[^d].{6}w'
# Check setuid/setgid files
find /opt/IBM/Guardium -type f \( -perm -4000 -o -perm -2000 \) -exec ls -la {} \;

🧯 If You Can't Patch

  • Implement strict access controls to limit which users have local access to Guardium systems
  • Enable detailed auditing and monitoring of privilege escalation attempts and file permission changes

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Security Guardium version 12.1 and review system logs for privilege escalation attempts or permission changes.

Check Version:

Check Guardium version through the Guardium interface or consult IBM documentation for version verification commands

Verify Fix Applied:

Verify the fix has been applied by checking the Guardium version and confirming with IBM's verification steps in the security bulletin.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Changes to file permissions in Guardium directories
  • Execution of privileged commands by non-root users
  • Failed or successful sudo/su attempts from Guardium-related accounts

Network Indicators:

  • Not applicable - this is a local vulnerability

SIEM Query:

source="guardium_logs" AND (event_type="privilege_escalation" OR event_type="permission_change" OR user="*" AND command="sudo" OR command="su")

🔗 References

📤 Share & Export