Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36367: CWE-862 Missing Authorization

0
High
VulnerabilityCVE-2025-36367cvecve-2025-36367cwe-862
Published: Sat Nov 01 2025 (11/01/2025, 12:01:31 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.

AI-Powered Analysis

AILast updated: 11/10/2025, 01:46:24 UTC

Technical Analysis

CVE-2025-36367 is a vulnerability classified under CWE-862 (Missing Authorization) that affects IBM i operating system versions 7.2 through 7.6. The root cause is an invalid authorization check within IBM i SQL services, which fails to properly verify the privileges of the requesting user. This flaw allows an attacker who already has some level of access (with privileges of another user profile) to escalate their privileges to root level on the host operating system. The vulnerability does not require user interaction and can be exploited remotely over the network (CVSS vector AV:N). The attack complexity is low (AC:L), and the attacker must have some privileges (PR:L) but no additional authentication or user interaction is needed. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify or delete data, and disrupt system operations. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical risk for organizations relying on IBM i systems. IBM i is widely used in enterprise environments for critical business applications, especially in industries such as finance, manufacturing, and logistics. The vulnerability's exploitation could lead to complete system takeover, data breaches, and operational disruptions.

Potential Impact

For European organizations, the impact of CVE-2025-36367 is substantial due to the critical role IBM i systems play in enterprise IT environments. Successful exploitation results in root-level access, enabling attackers to bypass all security controls, access sensitive business data, manipulate or destroy data, and disrupt critical services. This can lead to severe financial losses, reputational damage, and regulatory non-compliance, particularly under GDPR requirements for data protection. The vulnerability's network exploitability increases the risk of remote attacks, potentially affecting distributed environments and cloud-connected IBM i instances. Organizations in sectors such as banking, manufacturing, telecommunications, and government services are particularly vulnerable, as they often rely on IBM i for core business processes. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention to prevent potential targeted attacks.

Mitigation Recommendations

1. Monitor IBM's official security advisories closely and apply patches or updates as soon as they become available to address CVE-2025-36367. 2. Until patches are released, restrict access to IBM i SQL services to only trusted and necessary users and systems, using network segmentation and firewall rules. 3. Implement strict access controls and least privilege principles for all user profiles on IBM i systems to minimize the risk of privilege escalation. 4. Enable detailed logging and monitoring of SQL service usage and privilege escalation attempts to detect suspicious activities early. 5. Conduct regular security audits and vulnerability assessments focused on IBM i environments to identify and remediate potential weaknesses. 6. Educate system administrators and security teams about this vulnerability and the importance of rapid response. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous IBM i SQL service behavior. 8. Review and harden IBM i system configurations, disabling unnecessary services and interfaces to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905f7d9b1eaf3d2f0fca9cf

Added to database: 11/1/2025, 12:06:49 PM

Last enriched: 11/10/2025, 1:46:24 AM

Last updated: 12/16/2025, 5:07:55 PM

Views: 316

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats