CVE-2025-36244

7.4 HIGH

📋 TL;DR

This vulnerability allows local users on affected IBM AIX and VIOS systems to write files with root privileges when Kerberos authentication is configured. The issue stems from improper initialization of critical variables. Systems running IBM AIX 7.2, 7.3, IBM VIOS 3.1, and 4.1 with Kerberos enabled are affected.

💻 Affected Systems

Products:
  • IBM AIX
  • IBM VIOS
Versions: AIX 7.2, 7.3; VIOS 3.1, 4.1
Operating Systems: IBM AIX, IBM VIOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured to use Kerberos network authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, allowing complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local user gains root privileges to modify critical system files, install malware, or access sensitive data.

🟢

If Mitigated

Limited impact if systems have strict access controls, monitoring, and Kerberos is not enabled.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Local users (including compromised accounts) can exploit to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access; complexity is low once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IBM advisory for specific fix versions

Vendor Advisory: https://www.ibm.com/support/pages/node/7245092

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific patches. 2. Apply appropriate security patches from IBM. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable Kerberos Authentication

all

Temporarily disable Kerberos network authentication if not required.

# Edit Kerberos configuration files to disable
# Consult IBM documentation for specific commands

🧯 If You Can't Patch

  • Restrict local user access to affected systems
  • Implement strict monitoring and logging for file modification activities

🔍 How to Verify

Check if Vulnerable:

Check if system runs affected AIX/VIOS versions and has Kerberos enabled via configuration files.

Check Version:

oslevel -s

Verify Fix Applied:

Verify patch installation using IBM's patch management tools and check Kerberos configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications by non-root users
  • Kerberos authentication errors

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for file write events by non-root users on AIX/VIOS systems with Kerberos enabled.

🔗 References

📤 Share & Export