Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3473: CWE-277 Insecure Inherited Permissions in IBM Security Guardium

0
Medium
VulnerabilityCVE-2025-3473cvecve-2025-3473cwe-277
Published: Wed Jun 11 2025 (06/11/2025, 14:24:46 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Security Guardium

Description

IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:58:30 UTC

Technical Analysis

CVE-2025-3473 identifies a security vulnerability in IBM Security Guardium version 12.1 related to insecure inherited permissions (CWE-277). The vulnerability arises because the software creates permissions that are improperly inherited by child objects or processes, allowing a local user who already has elevated privileges to escalate those privileges further to root level. This escalation is possible without requiring user interaction, but it does require the attacker to have local privileged access initially. The vulnerability affects the confidentiality, integrity, and availability of the system since root access enables full control over the affected host. The CVSS 3.1 base score is 6.7, reflecting a medium severity with attack vector as local, low attack complexity, high privileges required, no user interaction, and unchanged scope. IBM Security Guardium is a data security and protection platform widely used in enterprise environments for database activity monitoring and compliance. The insecure permission inheritance could allow attackers to bypass security controls and gain full system control, potentially leading to data breaches or disruption of critical monitoring functions. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk in environments where local privileged users exist. The lack of patch links suggests that remediation may require vendor updates or configuration changes once available.

Potential Impact

The vulnerability allows local privileged users to escalate their privileges to root, which can lead to complete system compromise. This impacts confidentiality by exposing sensitive data monitored or protected by Guardium, integrity by allowing unauthorized modifications, and availability by potentially disrupting security monitoring services. Organizations relying on Guardium for compliance and data security could face regulatory penalties and operational risks if exploited. Since the attack requires local privileged access, insider threats or compromised administrative accounts pose the greatest risk. The ability to gain root access can also facilitate lateral movement and persistence within enterprise networks, amplifying the overall threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks. Enterprises with Guardium deployments must consider this vulnerability critical to their security posture, especially in highly regulated industries such as finance, healthcare, and government.

Mitigation Recommendations

Organizations should monitor IBM's official channels for patches or security advisories addressing CVE-2025-3473 and apply updates promptly once available. In the interim, review and harden local privileged user accounts to minimize unnecessary access, employing the principle of least privilege. Audit file system permissions and inherited permissions related to Guardium components to identify and correct insecure settings. Implement strict access controls and monitoring on systems running Guardium to detect unusual privilege escalations or unauthorized root access attempts. Employ host-based intrusion detection systems (HIDS) and endpoint protection solutions to alert on suspicious activities. Consider isolating Guardium servers and restricting local administrative access to trusted personnel only. Regularly review and update security policies governing privileged access and conduct user training to reduce insider threat risks. Finally, maintain comprehensive logging and incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-09T15:53:08.829Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849950223110031d41023ce

Added to database: 6/11/2025, 2:38:58 PM

Last enriched: 2/27/2026, 1:58:30 AM

Last updated: 3/21/2026, 3:16:22 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses