Skip to main content

CVE-2025-33122: CWE-427 Uncontrolled Search Path Element

High
VulnerabilityCVE-2025-33122cvecve-2025-33122cwe-427
Published: Tue Jun 17 2025 (06/17/2025, 17:13:00 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege.

AI-Powered Analysis

AILast updated: 06/17/2025, 17:34:34 UTC

Technical Analysis

CVE-2025-33122 is a high-severity vulnerability affecting IBM i operating system versions 7.2 through 7.6, specifically within the IBM Advanced Job Scheduler for i component. The root cause is an uncontrolled search path element (CWE-427), where the software uses an unqualified library call. This means that when the scheduler attempts to load libraries or executables, it does not specify a fully qualified path, allowing an attacker to influence the search path and cause the system to load malicious code instead of the intended legitimate library. Exploiting this vulnerability enables a malicious user with limited privileges (low privilege user) to execute arbitrary code with administrator-level privileges on the affected system. The vulnerability does not require user interaction but does require network access (attack vector is network) and has a high attack complexity, indicating some conditions must be met for exploitation. The CVSS 3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability is publicly disclosed and should be addressed promptly. The IBM Advanced Job Scheduler is a critical component used for automating batch jobs and workflows on IBM i systems, which are widely deployed in enterprise environments, especially in sectors like finance, manufacturing, and logistics. The ability to escalate privileges through this vulnerability poses a significant risk to the integrity and availability of business-critical operations running on IBM i platforms.

Potential Impact

For European organizations, the impact of CVE-2025-33122 could be severe due to the widespread use of IBM i systems in industries such as banking, insurance, manufacturing, and government services. Exploitation could lead to unauthorized administrative access, allowing attackers to manipulate job scheduling, disrupt critical batch processes, exfiltrate sensitive data, or deploy ransomware and other malware. This could result in operational downtime, financial losses, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. Given the high privileges gained, attackers could also establish persistent footholds, making remediation more complex. The vulnerability's network attack vector increases the risk of remote exploitation, especially in environments where IBM i systems are accessible from less trusted network segments or where network segmentation is insufficient. European organizations with legacy IBM i deployments or those slow to apply security updates are particularly at risk. Additionally, sectors with stringent uptime and data integrity requirements, such as financial services in countries like Germany, France, and the UK, could face heightened consequences from disruptions caused by exploitation.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to IBM Advanced Job Scheduler services to trusted internal networks only, using firewalls and network segmentation to minimize exposure. 2. Implement strict access controls and monitoring for users with low privileges who have access to IBM i systems, including auditing of job scheduler activities and library path modifications. 3. Use application whitelisting or integrity verification tools to detect unauthorized changes to library paths or executable files used by the scheduler. 4. Monitor system logs and security event data for unusual behavior indicative of privilege escalation attempts, such as unexpected library loads or job executions. 5. Engage with IBM support channels to obtain and apply official patches or updates as soon as they become available. 6. Conduct a thorough review of all unqualified library calls or similar path-related configurations in custom scripts or third-party applications running on IBM i to identify and remediate other potential uncontrolled search path elements. 7. Educate system administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving IBM i privilege escalations. 8. Consider deploying host-based intrusion detection systems (HIDS) tailored for IBM i environments to detect anomalous activities related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:56.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6851a3a1a8c921274385fb78

Added to database: 6/17/2025, 5:19:29 PM

Last enriched: 6/17/2025, 5:34:34 PM

Last updated: 8/2/2025, 11:10:18 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats