Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1095: CWE-420 Unprotected Alternate Channel in IBM Personal Communications

0
High
VulnerabilityCVE-2025-1095cvecve-2025-1095cwe-420
Published: Tue Apr 08 2025 (04/08/2025, 15:11:16 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Personal Communications

Description

IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:28:28 UTC

Technical Analysis

CVE-2025-1095 is a local privilege escalation vulnerability identified in IBM Personal Communications versions 14 and 15. The vulnerability stems from an unprotected alternate communication channel within a Windows service component of the product. This flaw allows any user who is interactively logged into the affected system to execute arbitrary commands with the highest system privileges under the NT AUTHORITY\SYSTEM account. The root cause is an incomplete remediation of a previous vulnerability (CVE-2024-25029), indicating that the patch applied did not fully address the underlying security issue. The vulnerability is classified under CWE-420, which involves unprotected alternate channels that bypass intended security controls. The CVSS v3.1 base score is 8.8, reflecting high severity due to the low attack complexity, low privileges required, no user interaction, and the potential for complete system compromise. The scope is changed (S:C) because the vulnerability affects components beyond the initially intended security boundary. Although no exploits have been reported in the wild, the potential for misuse is significant, especially in environments where multiple users have local access. The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to gain full control over the system, potentially leading to data theft, system manipulation, or denial of service. IBM has not yet released a patch, so mitigation currently relies on compensating controls. The vulnerability affects Windows-based deployments of IBM Personal Communications, a product commonly used in enterprise environments for terminal emulation and legacy system access.

Potential Impact

The impact of CVE-2025-1095 is substantial for organizations using IBM Personal Communications on Windows platforms. Successful exploitation grants attackers full SYSTEM-level privileges, enabling them to bypass all security restrictions, install malware, exfiltrate sensitive data, or disrupt critical operations. This can lead to complete system compromise, lateral movement within networks, and persistent footholds. Enterprises relying on IBM Personal Communications for accessing legacy systems or critical infrastructure may face operational disruptions and data breaches. The vulnerability's local nature means that attackers must have some level of access, but in environments with multiple users or weak endpoint controls, this is a realistic threat. The high severity score underscores the urgency for organizations to address this flaw to prevent privilege escalation attacks that could undermine enterprise security postures globally.

Mitigation Recommendations

Until an official patch is released by IBM, organizations should implement several specific mitigations: 1) Restrict local user accounts to the minimum necessary privileges and disable or remove unnecessary interactive logins on systems running IBM Personal Communications. 2) Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious command executions originating from IBM Personal Communications processes or related services. 3) Use Windows security features such as AppLocker or Software Restriction Policies to limit execution of unauthorized binaries or scripts. 4) Audit and monitor Windows event logs for unusual privilege escalation attempts or service interactions related to IBM Personal Communications. 5) Isolate systems running the affected software from less trusted users and networks to reduce exposure. 6) Prepare to deploy patches promptly once IBM releases them, and test updates in controlled environments before widespread rollout. 7) Educate local users about the risks of executing untrusted code or commands on affected systems. These targeted controls go beyond generic advice by focusing on minimizing local attack surface and enhancing detection capabilities specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-02-06T21:21:05.157Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b4f7b8ad5a09ad00c726f3

Added to database: 9/1/2025, 1:32:40 AM

Last enriched: 2/26/2026, 8:28:28 PM

Last updated: 3/25/2026, 8:43:19 PM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses