Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1331: CWE-242 Use of Inherently Dangerous Function in IBM CICS TX Standard

0
High
VulnerabilityCVE-2025-1331cvecve-2025-1331cwe-242
Published: Thu May 08 2025 (05/08/2025, 21:55:41 UTC)
Source: CVE
Vendor/Project: IBM
Product: CICS TX Standard

Description

IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to the use of unsafe use of the gets function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:31:03 UTC

Technical Analysis

CVE-2025-1331 is a vulnerability identified in IBM CICS TX Standard 11.1 and IBM CICS TX Advanced versions 10.1 and 11.1. The root cause is the unsafe use of the 'gets' function, a known inherently dangerous C library function that does not perform bounds checking on input buffers, leading to potential buffer overflow conditions. This vulnerability falls under CWE-242, which highlights the use of inherently unsafe functions that can lead to security issues such as arbitrary code execution. An attacker with local access and low privileges can exploit this flaw to execute arbitrary code on the affected system, potentially escalating privileges or disrupting system operations. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no requirement for user interaction. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the critical nature of IBM CICS TX environments, which are widely used in transaction processing for large enterprises, especially in banking, insurance, and government sectors. The lack of patch links suggests that a fix may be forthcoming or in development, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The vulnerability allows a local attacker to execute arbitrary code, which can lead to full system compromise including unauthorized data access, modification, or deletion, and disruption of critical transaction processing services. Given IBM CICS TX's role in managing high-volume, mission-critical transactions, exploitation could result in severe operational downtime, financial losses, and reputational damage. The ability to execute code with potentially elevated privileges increases the risk of persistent threats and lateral movement within enterprise networks. Organizations relying on affected versions may face compliance and regulatory risks if sensitive data is exposed or systems are disrupted. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability’s characteristics make it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately restrict local access to systems running IBM CICS TX Standard 11.1 and Advanced 10.1/11.1 to trusted personnel only, implementing strict access controls and monitoring for unusual activity. Employ application whitelisting and endpoint protection solutions to detect and prevent unauthorized code execution. Until an official patch is released, consider deploying runtime application self-protection (RASP) or memory protection mechanisms that can detect buffer overflow attempts. Conduct thorough code audits and input validation reviews for any custom extensions or integrations with CICS TX. Maintain up-to-date backups and incident response plans tailored for mainframe environments. Once IBM releases patches or updates, prioritize their deployment in all affected environments. Additionally, educate system administrators and security teams about the risks of using unsafe functions like 'gets' in legacy or custom code to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-02-15T00:10:22.206Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd71e2

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 2/26/2026, 8:31:03 PM

Last updated: 3/22/2026, 4:05:50 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses