CVE-2025-36059

4.7 MEDIUM

📋 TL;DR

This vulnerability in IBM Business Automation Workflow containers allows local users with container access to execute arbitrary operating system commands. It affects IBM Business Automation Workflow versions 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 006, as well as IBM Cloud Pak for Business Automation deployments using these versions.

💻 Affected Systems

Products:
  • IBM Business Automation Workflow
  • IBM Cloud Pak for Business Automation
Versions: 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, 24.0.0 through 24.0.0 Interim Fix 006
Operating Systems: Linux (containerized deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects containerized deployments. Requires local access to the container environment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious local user could gain full control of the container, potentially leading to data theft, privilege escalation, or lateral movement to other systems.

🟠

Likely Case

Local users with legitimate access could abuse this vulnerability to execute unauthorized commands, potentially compromising container integrity and accessing sensitive data.

🟢

If Mitigated

With proper access controls and container isolation, impact is limited to the specific container instance without affecting the host system or other containers.

🌐 Internet-Facing: LOW - This requires local access to the container, not remote network access.
🏢 Internal Only: MEDIUM - Internal users with container access could exploit this, but requires specific permissions and access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the container. No authentication bypass needed beyond container access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Business Automation Workflow 25.0.0 Interim Fix 003, 24.0.1 Interim Fix 006, or 24.0.0 Interim Fix 007

Vendor Advisory: https://www.ibm.com/support/pages/node/7256777

Restart Required: Yes

Instructions:

1. Download the appropriate interim fix from IBM Fix Central. 2. Apply the fix following IBM's container update procedures. 3. Restart the affected containers. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict Container Access

linux

Limit local access to containers to only authorized users and processes.

# Use Kubernetes RBAC or container runtime security policies
# Example: kubectl create rolebinding restricted-access --role=view --user=authorized-user --namespace=target-namespace

Implement Container Security Policies

linux

Use container security tools to restrict system call execution.

# Use seccomp profiles or AppArmor/SELinux policies
# Example: docker run --security-opt seccomp=profile.json your-container

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access containers.
  • Use container runtime security features to restrict system call execution.

🔍 How to Verify

Check if Vulnerable:

Check your IBM Business Automation Workflow version against affected versions. If running affected versions in containers, you are vulnerable.

Check Version:

# For IBM Business Automation Workflow containers, check version in container logs or configuration files

Verify Fix Applied:

Verify the applied interim fix version matches or exceeds the patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual system command execution from container processes
  • Unexpected process creation within containers
  • Container escape attempts in logs

Network Indicators:

  • Unusual outbound connections from containers to internal systems
  • Container-to-container communication not in normal patterns

SIEM Query:

container.runtime=* AND event.action="exec" AND process.name NOT IN ("expected-processes")

🔗 References

📤 Share & Export