CVE-2025-36193
📋 TL;DR
This vulnerability allows local privilege escalation to root within containers running vulnerable IBM Transformation Advisor Operator Catalog images. Attackers with local access can exploit incorrect file permission assignments to gain elevated privileges. Organizations using IBM Transformation Advisor versions 2.0.1 through 4.3.1 in containerized environments are affected.
💻 Affected Systems
- IBM Transformation Advisor
- IBM Transformation Advisor Operator Catalog
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full container compromise with root access, allowing attackers to escape the container, access host resources, or pivot to other systems in the Kubernetes cluster.
Likely Case
Local attackers gaining root privileges within the container, enabling data theft, persistence mechanisms, or lateral movement within the container environment.
If Mitigated
Limited impact if containers run with minimal privileges, proper network segmentation, and strict access controls preventing local user access.
🎯 Exploit Status
Exploitation requires local access to the container. The vulnerability involves file permission issues that can be leveraged through standard privilege escalation techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.3.2 or later
Vendor Advisory: https://www.ibm.com/support/pages/node/7243632
Restart Required: Yes
Instructions:
1. Update IBM Transformation Advisor to version 4.3.2 or later. 2. Rebuild and redeploy containers using the updated Operator Catalog image. 3. Verify all running containers are using the patched version.
🔧 Temporary Workarounds
Container Security Context Hardening
linuxConfigure containers to run with non-root users and minimal privileges
securityContext:
runAsNonRoot: true
runAsUser: 1000
allowPrivilegeEscalation: false
File Permission Remediation
linuxManually correct file permissions on critical security files within containers
chmod 600 /path/to/critical/files
chown root:root /path/to/critical/files
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local access to containers
- Deploy runtime security solutions that detect and block privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check IBM Transformation Advisor version: kubectl get pods -l app=transformation-advisor -o jsonpath='{.items[*].spec.containers[*].image}'
Check Version:
kubectl describe pod [pod-name] | grep Image
Verify Fix Applied:
Verify version is 4.3.2 or later and check file permissions on critical security files within containers
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- File permission modification attempts
- Container escape attempts
Network Indicators:
- Unusual outbound connections from containers
- Lateral movement attempts within Kubernetes cluster
SIEM Query:
source="container-logs" AND (event="privilege_escalation" OR event="file_permission_change") AND image="*transformation-advisor*"