Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2947: CWE-278 Insecure Preserved Inherited Permissions

0
High
VulnerabilityCVE-2025-2947cvecve-2025-2947cwe-278
Published: Thu Apr 17 2025 (04/17/2025, 17:10:52 UTC)
Source: CVE
Vendor/Project: IBM
Product: i

Description

IBM i 7.6  contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command.  A malicious actor can use the command to elevate privileges to gain root access to the host operating system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:10:50 UTC

Technical Analysis

CVE-2025-2947 is a privilege escalation vulnerability identified in IBM i version 7.6, related to CWE-278 (Insecure Preserved Inherited Permissions). The root cause is improper handling of profile swapping during the execution of a specific OS command, which allows an attacker who already has some level of privileges on the system to escalate their privileges to root level. This means the attacker can gain full administrative control over the host operating system, potentially bypassing security controls and accessing sensitive data or disrupting system operations. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), but requires that the attacker already have some privileges (PR:H) on the system. No user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the severity of a root-level compromise. Although no public exploits have been reported yet, the vulnerability is critical for organizations relying on IBM i 7.6, especially in environments where these systems manage sensitive or critical workloads. IBM has not yet published patches, so mitigation currently relies on access restrictions and monitoring.

Potential Impact

The potential impact of CVE-2025-2947 is significant for organizations running IBM i 7.6. Successful exploitation results in root-level access to the host OS, enabling attackers to fully control the system, access or modify sensitive data, disrupt services, install persistent malware, or pivot to other network assets. This can lead to severe confidentiality breaches, data integrity violations, and availability disruptions. Given IBM i's use in enterprise resource planning, financial services, manufacturing, and critical infrastructure, the vulnerability could have cascading effects on business operations and regulatory compliance. The requirement for existing privileges limits exposure somewhat, but insider threats or compromised accounts could easily leverage this flaw. The lack of known exploits in the wild currently reduces immediate risk but also means organizations should act proactively to prevent future exploitation.

Mitigation Recommendations

Until IBM releases an official patch, organizations should implement strict access controls to limit who can execute OS commands on IBM i 7.6 systems, especially restricting users with elevated privileges. Employ robust monitoring and logging to detect unusual command executions or privilege escalations. Use network segmentation and firewall rules to reduce exposure of IBM i systems to untrusted networks. Conduct regular audits of user privileges and remove unnecessary elevated permissions. Consider deploying host-based intrusion detection systems (HIDS) tailored for IBM i environments to identify suspicious activities. Once IBM releases a patch, prioritize its deployment in all affected environments. Additionally, educate administrators and users about the risks of privilege escalation and enforce the principle of least privilege to minimize attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-03-29T13:27:47.251Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf778a

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 2/26/2026, 9:10:50 PM

Last updated: 3/24/2026, 4:35:29 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses