CVE-2025-36004: CWE-427 Uncontrolled Search Path Element
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege.
AI Analysis
Technical Summary
CVE-2025-36004 is a high-severity vulnerability affecting IBM i operating system versions 7.2, 7.3, 7.4, and 7.5. The flaw arises from an uncontrolled search path element (CWE-427) within the IBM Facsimile Support component. Specifically, the vulnerability is due to an unqualified library call, which means that the system does not specify an absolute or secure path when loading libraries or executables. This allows a malicious actor to influence the search path and cause the system to load and execute user-controlled code instead of the intended trusted library. Because this code runs with administrator privileges, exploitation results in privilege escalation, enabling the attacker to gain elevated rights on the system. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where IBM i systems are used for critical business operations. The lack of patch links suggests that remediation may still be pending or that users must rely on vendor advisories for updates.
Potential Impact
For European organizations, the impact of CVE-2025-36004 can be substantial. IBM i systems are widely used in industries such as manufacturing, finance, logistics, and government agencies across Europe. Successful exploitation could lead to unauthorized administrative access, allowing attackers to manipulate sensitive data, disrupt business processes, or deploy further malware. The compromise of confidentiality could expose personal or financial data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could corrupt critical business data or system configurations, while availability impacts could cause operational downtime. Given the network attack vector and no requirement for user interaction, attackers could remotely exploit vulnerable systems, increasing the risk of widespread compromise in interconnected enterprise environments. The vulnerability's presence in multiple IBM i versions means that organizations running legacy or current systems are all at risk, particularly if they have not implemented strict library path controls or monitoring.
Mitigation Recommendations
To mitigate CVE-2025-36004 effectively, European organizations should: 1) Immediately audit IBM i systems to identify the presence and version of IBM Facsimile Support and verify if unqualified library calls are used. 2) Apply any available IBM patches or security updates as soon as they are released; monitor IBM security advisories closely. 3) Implement strict path validation and enforce the use of fully qualified library paths in system configurations and custom scripts to prevent loading untrusted code. 4) Restrict write permissions on directories and libraries involved in the facsimile support path to trusted administrators only, reducing the risk of malicious code placement. 5) Employ runtime application self-protection (RASP) or integrity monitoring tools to detect unauthorized changes or execution of unexpected binaries. 6) Conduct regular privilege audits and limit administrative privileges to the minimum necessary to reduce the attack surface. 7) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, such as unexpected process launches or privilege escalations. 8) Consider network segmentation to isolate IBM i systems from less trusted network zones, limiting exposure to external attackers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
CVE-2025-36004: CWE-427 Uncontrolled Search Path Element
Description
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege.
AI-Powered Analysis
Technical Analysis
CVE-2025-36004 is a high-severity vulnerability affecting IBM i operating system versions 7.2, 7.3, 7.4, and 7.5. The flaw arises from an uncontrolled search path element (CWE-427) within the IBM Facsimile Support component. Specifically, the vulnerability is due to an unqualified library call, which means that the system does not specify an absolute or secure path when loading libraries or executables. This allows a malicious actor to influence the search path and cause the system to load and execute user-controlled code instead of the intended trusted library. Because this code runs with administrator privileges, exploitation results in privilege escalation, enabling the attacker to gain elevated rights on the system. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where IBM i systems are used for critical business operations. The lack of patch links suggests that remediation may still be pending or that users must rely on vendor advisories for updates.
Potential Impact
For European organizations, the impact of CVE-2025-36004 can be substantial. IBM i systems are widely used in industries such as manufacturing, finance, logistics, and government agencies across Europe. Successful exploitation could lead to unauthorized administrative access, allowing attackers to manipulate sensitive data, disrupt business processes, or deploy further malware. The compromise of confidentiality could expose personal or financial data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could corrupt critical business data or system configurations, while availability impacts could cause operational downtime. Given the network attack vector and no requirement for user interaction, attackers could remotely exploit vulnerable systems, increasing the risk of widespread compromise in interconnected enterprise environments. The vulnerability's presence in multiple IBM i versions means that organizations running legacy or current systems are all at risk, particularly if they have not implemented strict library path controls or monitoring.
Mitigation Recommendations
To mitigate CVE-2025-36004 effectively, European organizations should: 1) Immediately audit IBM i systems to identify the presence and version of IBM Facsimile Support and verify if unqualified library calls are used. 2) Apply any available IBM patches or security updates as soon as they are released; monitor IBM security advisories closely. 3) Implement strict path validation and enforce the use of fully qualified library paths in system configurations and custom scripts to prevent loading untrusted code. 4) Restrict write permissions on directories and libraries involved in the facsimile support path to trusted administrators only, reducing the risk of malicious code placement. 5) Employ runtime application self-protection (RASP) or integrity monitoring tools to detect unauthorized changes or execution of unexpected binaries. 6) Conduct regular privilege audits and limit administrative privileges to the minimum necessary to reduce the attack surface. 7) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, such as unexpected process launches or privilege escalations. 8) Consider network segmentation to isolate IBM i systems from less trusted network zones, limiting exposure to external attackers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:05.532Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685b673066faf0c1de3b986a
Added to database: 6/25/2025, 3:04:16 AM
Last enriched: 6/25/2025, 3:19:26 AM
Last updated: 6/25/2025, 6:44:56 AM
Views: 7
Related Threats
CVE-2025-43880: Inefficient regular expression complexity in GROWI, Inc. GROWI
MediumCVE-2025-0966: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM InfoSphere Information Server
HighCVE-2025-5585: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gpriday SiteOrigin Widgets Bundle
MediumCVE-2025-6583: SQL Injection in SourceCodester Best Salon Management System
MediumCVE-2025-6582: SQL Injection in SourceCodester Best Salon Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.