CVE-2025-36194

2.8 LOW

📋 TL;DR

This vulnerability in IBM PowerVM Hypervisor firmware allows a peer partition to access a limited amount of data in specific shared processor configurations. It affects IBM PowerVM Hypervisor firmware versions FW1110.00-FW1110.03, FW1060.00-FW1060.51, and FW950.00-FW950.F0. The exposure occurs during certain operations and requires specific shared processor configurations.

💻 Affected Systems

Products:
  • IBM PowerVM Hypervisor
Versions: FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, FW950.00 through FW950.F0
Operating Systems: IBM AIX, IBM i, Linux on Power
Default Config Vulnerable: ✅ No
Notes: Only affects systems with specific shared processor configurations where partitions share processors. Dedicated processor configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with access to a peer partition could potentially access sensitive data from another partition, leading to information disclosure that could facilitate further attacks.

🟠

Likely Case

Limited data exposure between peer partitions in shared processor environments, potentially revealing system state information but not critical secrets.

🟢

If Mitigated

With proper partition isolation and access controls, the impact is minimal as only limited data is exposed and requires specific configurations.

🌐 Internet-Facing: LOW - This vulnerability requires access to a peer partition and specific shared processor configurations, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - In multi-tenant PowerVM environments with shared processors, malicious tenants could potentially access limited data from peer partitions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires access to a peer partition and specific shared processor configurations. The vulnerability exposes limited data during certain operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FW1110.04, FW1060.52, FW950.F1 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7257555

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from IBM Fix Central. 2. Apply the firmware update following IBM PowerVM firmware update procedures. 3. Reboot the system to activate the new firmware.

🔧 Temporary Workarounds

Use Dedicated Processor Configurations

all

Configure partitions with dedicated processors instead of shared processors to eliminate the vulnerability.

Partition Isolation

all

Ensure proper partition isolation and access controls to limit potential data exposure between partitions.

🧯 If You Can't Patch

  • Use dedicated processor configurations instead of shared processors
  • Implement strict access controls and monitoring between partitions

🔍 How to Verify

Check if Vulnerable:

Check firmware version using 'lparstat -i' or HMC/IVM interface and verify if running affected versions with shared processor configurations.

Check Version:

lparstat -i | grep -i firmware

Verify Fix Applied:

Verify firmware version is FW1110.04+, FW1060.52+, or FW950.F1+ using 'lparstat -i' or HMC/IVM interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual partition-to-partition communication patterns
  • Unexpected data access attempts between partitions

Network Indicators:

  • Unusual inter-partition network traffic in shared processor environments

SIEM Query:

source="powervm_logs" AND (event_type="partition_access" OR event_type="shared_processor_activity")

🔗 References

📤 Share & Export