Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36096: CWE-522 Insufficiently Protected Credentials in IBM AIX

0
Critical
VulnerabilityCVE-2025-36096cvecve-2025-36096cwe-522
Published: Thu Nov 13 2025 (11/13/2025, 22:01:22 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: AIX

Description

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 stores NIM private keys used in NIM environments in an insecure way which is susceptible to unauthorized access by an attacker using man in the middle techniques.

AI-Powered Analysis

AILast updated: 11/13/2025, 22:20:40 UTC

Technical Analysis

CVE-2025-36096 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) that affects IBM AIX operating system versions 7.2 and 7.3, as well as IBM VIOS versions 3.1 and 4.1. The issue arises from the insecure storage of Network Installation Manager (NIM) private keys within these environments. NIM is a component used for managing and deploying AIX systems, and the private keys are critical for authenticating and securing communications within NIM-managed environments. Due to improper protection of these keys, an attacker capable of performing man-in-the-middle (MitM) attacks on the network can intercept these credentials. This interception can lead to unauthorized access to NIM environments, allowing the attacker to compromise system integrity, confidentiality, and availability. The vulnerability has a CVSS v3.1 score of 9.0, indicating critical severity. The vector metrics specify that the attack requires network access (AV:N), has high attack complexity (AC:H), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are reported in the wild yet, and no patches are currently linked, indicating that organizations should prepare for imminent remediation. The vulnerability was reserved in April 2025 and published in November 2025.

Potential Impact

For European organizations, the impact of CVE-2025-36096 is significant, especially for those relying on IBM AIX and VIOS in their IT infrastructure. The compromise of NIM private keys can lead to unauthorized administrative access to system deployment and management processes, potentially allowing attackers to deploy malicious configurations, disrupt system availability, or exfiltrate sensitive data. Critical sectors such as finance, telecommunications, manufacturing, and government agencies that use IBM AIX for mission-critical workloads are particularly at risk. The ability to perform MitM attacks depends on network access, which may be feasible in poorly segmented or inadequately secured environments. The vulnerability could facilitate lateral movement within networks, increasing the risk of widespread compromise. Additionally, the high severity and scope change indicate that the impact could extend beyond the initially affected systems, potentially affecting interconnected systems and services. This raises concerns about supply chain security and operational continuity in European enterprises.

Mitigation Recommendations

Organizations should immediately review and harden their NIM environments by restricting network access to trusted hosts and implementing strong network segmentation to limit exposure to MitM attacks. Deploying encryption protocols such as TLS with mutual authentication for NIM communications can reduce interception risks. Monitoring network traffic for unusual patterns indicative of MitM or credential interception attempts is critical. IBM should be engaged to obtain patches or security updates as soon as they become available; organizations must prioritize timely deployment of these fixes. Additionally, rotating NIM private keys and credentials after patching will help mitigate risks from previously compromised keys. Employing intrusion detection and prevention systems (IDPS) tailored to detect lateral movement and credential misuse within AIX environments is recommended. Regular security audits and penetration testing focused on NIM and VIOS configurations will help identify and remediate weaknesses. Finally, educating system administrators on secure key management and network security best practices is essential to prevent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:14.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69165800ef0b598b9f6fad81

Added to database: 11/13/2025, 10:13:20 PM

Last enriched: 11/13/2025, 10:20:40 PM

Last updated: 11/14/2025, 5:59:50 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats