Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36238: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM PowerVM Hypervisor

0
Medium
VulnerabilityCVE-2025-36238cvecve-2025-36238cwe-497
Published: Mon Feb 02 2026 (02/02/2026, 21:54:27 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: PowerVM Hypervisor

Description

IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 could allow a local user with administration privileges to obtain sensitive information from a Virtual TPM through a series of PowerVM service procedures.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:47:18 UTC

Technical Analysis

CVE-2025-36238 is a vulnerability identified in IBM PowerVM Hypervisor firmware versions FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0. The flaw arises from improper handling of Virtual Trusted Platform Module (vTPM) data within certain PowerVM service procedures. Specifically, a local user who already possesses administrative privileges on the system can leverage this vulnerability to extract sensitive information from the vTPM. The vTPM is a critical component used to provide hardware-based security functions in virtualized environments, including key storage and cryptographic operations. Exposure of such sensitive information can undermine the security assurances provided by the vTPM, potentially enabling further attacks or unauthorized access to protected data. The vulnerability is classified under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. The CVSS v3.1 score is 6.0, indicating a medium severity level. The attack vector is local (AV:L), attack complexity is low (AC:L), privileges required are high (PR:H), no user interaction is needed (UI:N), and the scope is changed (S:C) due to the potential impact crossing security boundaries. The impact affects confidentiality (C:H) but not integrity (I:N) or availability (A:N). No public exploits or patches have been reported yet, but the vulnerability is published and should be addressed promptly. This vulnerability is particularly relevant for environments that rely on IBM PowerVM for virtualization and use vTPM for securing virtual machines, as it could lead to leakage of cryptographic keys or other sensitive data stored in the vTPM.

Potential Impact

For European organizations, the impact of CVE-2025-36238 centers on the potential exposure of sensitive cryptographic material and security information stored within the Virtual TPM on IBM PowerVM hypervisors. This could compromise the confidentiality of virtualized workloads, especially those handling sensitive or regulated data such as financial, governmental, or healthcare information. Organizations using IBM PowerVM in critical infrastructure, cloud service providers, and enterprises with virtualized environments are at risk of internal data breaches if administrative accounts are compromised or misused. Although exploitation requires local administrative privileges, insider threats or attackers who have gained elevated access could leverage this vulnerability to escalate their capabilities or extract sensitive keys, undermining trust in the virtualization security model. The vulnerability does not directly impact system integrity or availability, so it is less likely to cause service disruptions but poses a significant risk to data confidentiality and compliance with data protection regulations such as GDPR. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after vulnerability disclosure. European organizations should consider this vulnerability in their risk assessments and incident response planning, particularly those with IBM PowerVM deployments in sectors with high security requirements.

Mitigation Recommendations

1. Restrict administrative access: Limit the number of users with administrative privileges on IBM PowerVM hypervisors to only trusted and vetted personnel. Implement strict access controls and monitoring for administrative accounts. 2. Monitor and audit PowerVM service procedures: Enable detailed logging and monitoring of PowerVM service calls related to vTPM to detect unusual or unauthorized access attempts. 3. Network segmentation and isolation: Ensure that management interfaces and hypervisor control planes are isolated from general user networks to reduce the risk of local privilege escalation by unauthorized users. 4. Apply patches promptly: Although no patches are currently listed, monitor IBM security advisories closely and apply firmware updates as soon as they become available to remediate this vulnerability. 5. Use multi-factor authentication (MFA) for administrative access to reduce the risk of credential compromise. 6. Conduct regular security reviews and penetration testing focused on virtualization infrastructure to identify potential privilege escalation paths. 7. Consider additional encryption or key management solutions external to the vTPM to reduce reliance on the vulnerable component. 8. Implement strict insider threat detection and response mechanisms to identify misuse of administrative privileges. These measures go beyond generic advice by focusing on controlling and monitoring privileged access, isolating critical management interfaces, and preparing for patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:42.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a045

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/2/2026, 11:47:18 PM

Last updated: 2/7/2026, 2:13:08 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats