Skip to main content

CVE-2025-33108: CWE-250 Execution with Unnecessary Privileges in IBM Backup Recovery and Media Services for i

High
VulnerabilityCVE-2025-33108cvecve-2025-33108cwe-250
Published: Sat Jun 14 2025 (06/14/2025, 00:25:23 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Backup Recovery and Media Services for i

Description

IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system.

AI-Powered Analysis

AILast updated: 08/25/2025, 00:38:42 UTC

Technical Analysis

CVE-2025-33108 is a high-severity vulnerability affecting IBM Backup, Recovery and Media Services (BRMS) for IBM i operating system versions 7.4 and 7.5. The vulnerability arises from an execution with unnecessary privileges issue (CWE-250), where a BRMS program makes an unqualified library call. This flaw allows a user who already has the capability to compile or restore programs to escalate their privileges beyond the intended scope. Specifically, the vulnerability enables execution of user-controlled code with component-level access to the host operating system, which is a significant privilege escalation vector. The vulnerability is network exploitable (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and has a scope change (S:C), meaning it affects resources beyond the initially compromised component. The impact includes full confidentiality, integrity, and availability compromise (C:H/I:H/A:H). Although no known exploits are currently in the wild, the high CVSS score of 8.5 indicates a serious risk if exploited. The root cause is related to improper privilege management and unqualified library calls within BRMS, which is a critical backup and recovery tool used in IBM i environments. This vulnerability could allow malicious insiders or attackers with limited access to gain full control over the system, potentially leading to data theft, system manipulation, or disruption of backup and recovery operations.

Potential Impact

For European organizations relying on IBM i systems with BRMS versions 7.4 or 7.5, this vulnerability poses a significant risk. Compromise could lead to unauthorized access to sensitive data, disruption of critical backup and recovery processes, and potential full system takeover. This is particularly impactful for industries with strict data protection regulations such as finance, healthcare, and government sectors prevalent in Europe. The ability to execute code with elevated privileges could facilitate lateral movement within networks, data exfiltration, or sabotage of recovery mechanisms, undermining business continuity and compliance with GDPR and other regulatory frameworks. Given the critical role of BRMS in data protection, exploitation could result in severe operational and reputational damage.

Mitigation Recommendations

Organizations should prioritize patching or upgrading IBM BRMS to versions where this vulnerability is addressed once patches are available. Until then, implement strict access controls to limit who can compile or restore programs, as these capabilities are prerequisites for exploitation. Employ application whitelisting and monitor for unusual BRMS-related activities or unexpected library calls. Conduct regular audits of user privileges and enforce the principle of least privilege rigorously. Network segmentation should isolate IBM i systems to reduce exposure. Additionally, enable detailed logging and alerting on BRMS operations to detect potential exploitation attempts early. Engage with IBM support for any interim mitigation guidance and monitor IBM security advisories for updates or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:49.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684cc715a8c9212743811df0

Added to database: 6/14/2025, 12:49:25 AM

Last enriched: 8/25/2025, 12:38:42 AM

Last updated: 9/25/2025, 5:16:14 PM

Views: 55

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats