Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36194: CWE-1262 Improper Access Control for Register Interface in IBM PowerVM Hypervisor

0
Low
VulnerabilityCVE-2025-36194cvecve-2025-36194cwe-1262
Published: Mon Feb 02 2026 (02/02/2026, 22:01:36 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: PowerVM Hypervisor

Description

IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 may expose a limited amount of data to a peer partition in specific shared processor configurations during certain operations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:45:44 UTC

Technical Analysis

CVE-2025-36194 is a vulnerability classified under CWE-1262 (Improper Access Control) affecting IBM PowerVM Hypervisor firmware versions FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0. The flaw arises in the register interface of the hypervisor, which in certain shared processor configurations can expose a limited amount of data from one partition to a peer partition. This occurs during specific operations where the hypervisor fails to enforce strict access controls between partitions sharing processor resources. The vulnerability is limited to data confidentiality exposure; it does not permit data modification or denial of service. Exploitation requires local access with low privileges, a high level of attack complexity, and no user interaction. The scope is limited to environments where shared processor configurations are in use, which is a common setup in virtualized IBM Power Systems environments. The CVSS v3.1 score is 2.8, reflecting the low severity due to limited impact and exploitation difficulty. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of strict partition isolation and secure hypervisor design in multi-tenant or multi-partition environments.

Potential Impact

For European organizations, the primary impact is a limited confidentiality breach where sensitive data from one partition could be exposed to another partition on the same physical host. This could affect organizations using IBM PowerVM Hypervisor in shared processor configurations, particularly those running sensitive workloads in multi-tenant or multi-department environments. Although the data exposure is limited and does not affect integrity or availability, even small leaks of sensitive information can have regulatory and reputational consequences under GDPR and other data protection laws. The impact is more pronounced in sectors such as finance, government, and critical infrastructure, where IBM Power Systems are commonly deployed. Since the vulnerability requires local access and has high attack complexity, the risk is mitigated somewhat by existing access controls but remains relevant for insider threats or compromised partitions. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance and remediation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Apply IBM patches or firmware updates as soon as they become available to address CVE-2025-36194. 2) Restrict and monitor shared processor configurations, limiting their use to trusted partitions only. 3) Enforce strict access control policies and segmentation between partitions to minimize the risk of data leakage. 4) Conduct regular audits of partition configurations and inter-partition communication to detect anomalous data flows. 5) Employ enhanced logging and monitoring on hypervisor management interfaces to identify potential exploitation attempts. 6) Limit administrative access to hypervisor management consoles and ensure multi-factor authentication is in place. 7) Educate system administrators about the risks of shared processor configurations and the importance of applying security updates promptly. 8) Consider isolating highly sensitive workloads on dedicated physical resources if feasible to eliminate shared processor risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:24.268Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a042

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/10/2026, 10:45:44 AM

Last updated: 3/25/2026, 6:50:31 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses