Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33109: CWE-250 Execution with Unnecessary Privileges

0
High
VulnerabilityCVE-2025-33109cvecve-2025-33109cwe-250
Published: Thu Jul 24 2025 (07/24/2025, 15:06:49 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid database authority check. A bad actor could execute a database procedure or function without having all required permissions, in addition to causing denial of service for some database actions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:39:26 UTC

Technical Analysis

CVE-2025-33109 is a vulnerability identified in IBM i operating system versions 7.2 through 7.6, categorized under CWE-250: Execution with Unnecessary Privileges. The root cause is an invalid database authority check that improperly validates permissions when executing database procedures or functions. This flaw allows an attacker with limited privileges to escalate their access by executing database operations without possessing the full set of required permissions. Additionally, the vulnerability can be leveraged to cause denial of service (DoS) conditions affecting certain database actions, potentially disrupting normal operations. The CVSS 3.1 base score of 7.5 reflects a high severity, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the critical nature of IBM i systems in enterprise environments. The vulnerability affects a broad range of IBM i versions, indicating a long-standing issue across multiple releases. The lack of available patches at the time of reporting necessitates immediate attention to access controls and monitoring to mitigate risk until official fixes are released.

Potential Impact

The vulnerability allows attackers with limited privileges to escalate their access and execute database procedures or functions without proper authorization, compromising confidentiality and integrity of sensitive data. Unauthorized execution of database operations can lead to data leakage, unauthorized data modification, or corruption. The ability to cause denial of service conditions threatens availability, potentially disrupting critical business processes dependent on IBM i databases. Organizations using IBM i for financial, manufacturing, or supply chain systems could face operational downtime, regulatory compliance violations, and reputational damage. The network-based attack vector and absence of required user interaction increase the likelihood of exploitation in targeted attacks or insider threat scenarios. Given IBM i's widespread use in critical infrastructure and enterprise environments, the impact can be severe and far-reaching.

Mitigation Recommendations

1. Monitor IBM's official security advisories closely and apply patches promptly once released to address CVE-2025-33109. 2. Until patches are available, restrict access to database procedures and functions to only trusted and necessary accounts, enforcing the principle of least privilege rigorously. 3. Implement enhanced logging and monitoring of database procedure executions to detect anomalous or unauthorized activity early. 4. Use network segmentation and firewall rules to limit exposure of IBM i systems to untrusted networks, reducing attack surface. 5. Conduct regular audits of database permissions and review user roles to ensure no excessive privileges are granted. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious database activity patterns. 7. Educate administrators and security teams about this vulnerability to increase awareness and readiness for incident response. 8. Consider temporary compensating controls such as disabling non-essential database procedures or functions that could be exploited.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:49.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68824ec4ad5a09ad0037ab17

Added to database: 7/24/2025, 3:18:28 PM

Last enriched: 2/27/2026, 1:39:26 AM

Last updated: 3/22/2026, 11:14:41 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses