CVE-2025-36119

7.1 HIGH

📋 TL;DR

CVE-2025-36119 is a web session hijacking vulnerability in IBM Digital Certificate Manager for i (DCM) that allows authenticated non-administrator users to escalate privileges and perform administrative actions. This affects IBM i operating systems versions 7.3 through 7.6. Attackers can hijack web sessions to gain unauthorized administrative access to certificate management functions.

💻 Affected Systems

Products:
  • IBM Digital Certificate Manager for i (DCM)
Versions: 7.3, 7.4, 7.5, 7.6
Operating Systems: IBM i
Default Config Vulnerable: ⚠️ Yes
Notes: Requires DCM to be installed and accessible to authenticated users. The vulnerability exists in the web interface session management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over DCM, allowing them to issue fraudulent certificates, revoke legitimate certificates, or compromise certificate-based authentication systems across the enterprise.

🟠

Likely Case

An authenticated user with malicious intent escalates privileges to perform unauthorized certificate operations, potentially disrupting services or enabling further attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated certificate management issues that can be quickly detected and remediated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires an authenticated user session and knowledge of session hijacking techniques. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM i PTF Group SF99738 Level 16 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7241008

Restart Required: Yes

Instructions:

1. Download and apply IBM i PTF Group SF99738 Level 16 or later. 2. Restart affected IBM i systems. 3. Verify DCM functionality post-patch.

🔧 Temporary Workarounds

Restrict DCM Access

all

Limit access to DCM web interface to only authorized administrators using network segmentation or access control lists.

Session Timeout Reduction

all

Configure shorter session timeout values for DCM web sessions to reduce window for session hijacking.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DCM from general user networks.
  • Enforce multi-factor authentication for all DCM administrative access and monitor for unusual privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check IBM i version and PTF level: DSPPTF LICPGM(5770SS1) SELECT(*CURRENT) OUTPUT(*PRINT). Verify if PTF Group SF99738 Level 16 or later is installed.

Check Version:

DSPPTF LICPGM(5770SS1) SELECT(*CURRENT)

Verify Fix Applied:

Confirm PTF Group SF99738 Level 16 or later is applied and active. Test DCM functionality to ensure no regression issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in DCM audit logs
  • Multiple failed authentication attempts followed by successful administrative actions from non-admin users
  • Session ID anomalies or reuse patterns

Network Indicators:

  • Unusual traffic patterns to DCM web interface from non-admin IP addresses
  • Session cookie manipulation attempts

SIEM Query:

source="ibm_i_dcm" AND (event_type="privilege_escalation" OR user_role_change="admin")

🔗 References

📤 Share & Export