Skip to main content

CVE-2025-1330: CWE-787 Out-of-bounds Write in IBM CICS TX Standard

High
VulnerabilityCVE-2025-1330cvecve-2025-1330cwe-787
Published: Thu May 08 2025 (05/08/2025, 21:54:42 UTC)
Source: CVE
Vendor/Project: IBM
Product: CICS TX Standard

Description

IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1  could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname function.

AI-Powered Analysis

AILast updated: 08/29/2025, 00:48:06 UTC

Technical Analysis

CVE-2025-1330 is a high-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1. The flaw arises from improper handling of DNS return requests by the gethostbyname function, which is used to resolve hostnames to IP addresses. Specifically, the vulnerability allows a local user with limited privileges (low-level privileges) to exploit an out-of-bounds write condition. This can lead to arbitrary code execution on the affected system. The vulnerability does not require user interaction but does require local access with some privileges, making it a local privilege escalation vector. The CVSS v3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to execute malicious code, potentially leading to full system compromise, data breaches, or disruption of critical transaction processing systems that rely on IBM CICS TX. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the critical role of CICS TX in enterprise transaction management make this a significant risk that must be addressed promptly.

Potential Impact

European organizations that rely on IBM CICS TX Standard or Advanced versions 10.1 and 11.1 for transaction processing, especially in sectors such as banking, finance, insurance, and government, face considerable risk. Exploitation could lead to unauthorized code execution, allowing attackers to manipulate transaction data, disrupt services, or exfiltrate sensitive information. Given the critical role of CICS TX in managing high-volume, mission-critical transactions, successful exploitation could result in severe operational disruptions, financial losses, regulatory non-compliance, and reputational damage. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or attackers who gain initial foothold through other means could leverage this vulnerability to escalate privileges and move laterally within networks. The high confidentiality, integrity, and availability impact underscores the importance of rapid remediation to protect sensitive European infrastructure and data.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Apply IBM-provided patches or updates as soon as they become available, as no patches are currently linked but IBM is expected to release fixes promptly. 2) Restrict local access to systems running affected versions of CICS TX to trusted personnel only, employing strict access controls and monitoring. 3) Implement robust endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 4) Conduct thorough audits of user privileges and remove unnecessary local access rights to minimize the attack surface. 5) Use network segmentation to isolate critical transaction processing systems from less secure network zones, reducing the risk of lateral movement. 6) Monitor system and application logs for unusual DNS resolution activity or errors related to gethostbyname function calls. 7) Prepare incident response plans specifically addressing potential exploitation scenarios involving local privilege escalation and arbitrary code execution on CICS TX systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-02-15T00:10:21.346Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd71de

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 8/29/2025, 12:48:06 AM

Last updated: 9/26/2025, 2:20:46 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats