Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36250: CWE-114 Process Control in IBM AIX

0
Critical
VulnerabilityCVE-2025-36250cvecve-2025-36250cwe-114
Published: Thu Nov 13 2025 (11/13/2025, 22:01:27 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: AIX

Description

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to execute arbitrary commands due to improper process controls.  This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56346.

AI-Powered Analysis

AILast updated: 11/13/2025, 22:21:23 UTC

Technical Analysis

CVE-2025-36250 is a critical vulnerability classified under CWE-114 (Process Control) affecting IBM AIX operating system versions 7.2 and 7.3, as well as IBM VIOS versions 3.1 and 4.1, specifically targeting the NIM server service (nimesis). The vulnerability allows a remote attacker to execute arbitrary commands on the affected system without requiring any authentication or user interaction. The root cause lies in improper process control mechanisms within the NIM server service, which can be exploited remotely over the network. This vulnerability expands on previously addressed attack vectors from CVE-2024-56346, indicating that the initial patch did not fully mitigate all exploitation paths. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to the vulnerability's characteristics: network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that affects resources beyond the vulnerable component. The impact includes full compromise of confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a prime target for threat actors. The vulnerability affects enterprise-grade IBM AIX and VIOS environments, commonly used in large-scale data centers and critical infrastructure, emphasizing the need for rapid remediation.

Potential Impact

For European organizations, the impact of CVE-2025-36250 is substantial. IBM AIX and VIOS are widely deployed in sectors such as finance, telecommunications, manufacturing, and government, where system availability and data integrity are paramount. Exploitation could lead to complete system takeover, unauthorized data access, disruption of critical services, and potential lateral movement within networks. This could result in severe operational downtime, financial losses, regulatory penalties under GDPR for data breaches, and damage to organizational reputation. The vulnerability’s ability to be exploited remotely without authentication increases the risk of widespread attacks, especially in environments where NIM servers are exposed or insufficiently segmented. Additionally, the scope change in the vulnerability means that compromise could extend beyond the initial service, affecting other system components and services, amplifying the overall damage.

Mitigation Recommendations

1. Immediate application of any IBM-provided patches or updates addressing CVE-2025-36250 once available is critical. 2. Until patches are deployed, restrict network access to NIM server services (nimesis) by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. 3. Conduct thorough audits of IBM AIX and VIOS environments to identify all NIM server instances and verify their exposure status. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous activities targeting the NIM service. 5. Implement robust monitoring and logging of NIM server activities to enable rapid detection of exploitation attempts. 6. Review and harden process control configurations and permissions related to the NIM service to reduce attack surface. 7. Develop and test incident response plans specifically for AIX/VIOS environments to ensure readiness in case of compromise. 8. Engage with IBM support and security advisories for ongoing updates and guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:44.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69165800ef0b598b9f6fad87

Added to database: 11/13/2025, 10:13:20 PM

Last enriched: 11/13/2025, 10:21:23 PM

Last updated: 11/14/2025, 4:07:06 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats