CVE-2025-36367: CWE-862 Missing Authorization
IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.
AI Analysis
Technical Summary
CVE-2025-36367 is a vulnerability classified under CWE-862 (Missing Authorization) that affects IBM i operating system versions 7.2 through 7.6. The root cause is an invalid authorization check within IBM i SQL services, which fails to properly verify the privileges of the requesting user. This flaw allows an attacker who already has some level of access (with privileges of another user profile) to escalate their privileges to root level on the host operating system. The vulnerability does not require user interaction and can be exploited remotely over the network (CVSS vector AV:N). The attack complexity is low (AC:L), and the attacker must have some privileges (PR:L) but no additional authentication or user interaction is needed. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify or delete data, and disrupt system operations. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical risk for organizations relying on IBM i systems. IBM i is widely used in enterprise environments for critical business applications, especially in industries such as finance, manufacturing, and logistics. The vulnerability's exploitation could lead to complete system takeover, data breaches, and operational disruptions.
Potential Impact
For European organizations, the impact of CVE-2025-36367 is substantial due to the critical role IBM i systems play in enterprise IT environments. Successful exploitation results in root-level access, enabling attackers to bypass all security controls, access sensitive business data, manipulate or destroy data, and disrupt critical services. This can lead to severe financial losses, reputational damage, and regulatory non-compliance, particularly under GDPR requirements for data protection. The vulnerability's network exploitability increases the risk of remote attacks, potentially affecting distributed environments and cloud-connected IBM i instances. Organizations in sectors such as banking, manufacturing, telecommunications, and government services are particularly vulnerable, as they often rely on IBM i for core business processes. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention to prevent potential targeted attacks.
Mitigation Recommendations
1. Monitor IBM's official security advisories closely and apply patches or updates as soon as they become available to address CVE-2025-36367. 2. Until patches are released, restrict access to IBM i SQL services to only trusted and necessary users and systems, using network segmentation and firewall rules. 3. Implement strict access controls and least privilege principles for all user profiles on IBM i systems to minimize the risk of privilege escalation. 4. Enable detailed logging and monitoring of SQL service usage and privilege escalation attempts to detect suspicious activities early. 5. Conduct regular security audits and vulnerability assessments focused on IBM i environments to identify and remediate potential weaknesses. 6. Educate system administrators and security teams about this vulnerability and the importance of rapid response. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous IBM i SQL service behavior. 8. Review and harden IBM i system configurations, disabling unnecessary services and interfaces to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Sweden
CVE-2025-36367: CWE-862 Missing Authorization
Description
IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.
AI-Powered Analysis
Technical Analysis
CVE-2025-36367 is a vulnerability classified under CWE-862 (Missing Authorization) that affects IBM i operating system versions 7.2 through 7.6. The root cause is an invalid authorization check within IBM i SQL services, which fails to properly verify the privileges of the requesting user. This flaw allows an attacker who already has some level of access (with privileges of another user profile) to escalate their privileges to root level on the host operating system. The vulnerability does not require user interaction and can be exploited remotely over the network (CVSS vector AV:N). The attack complexity is low (AC:L), and the attacker must have some privileges (PR:L) but no additional authentication or user interaction is needed. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify or delete data, and disrupt system operations. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical risk for organizations relying on IBM i systems. IBM i is widely used in enterprise environments for critical business applications, especially in industries such as finance, manufacturing, and logistics. The vulnerability's exploitation could lead to complete system takeover, data breaches, and operational disruptions.
Potential Impact
For European organizations, the impact of CVE-2025-36367 is substantial due to the critical role IBM i systems play in enterprise IT environments. Successful exploitation results in root-level access, enabling attackers to bypass all security controls, access sensitive business data, manipulate or destroy data, and disrupt critical services. This can lead to severe financial losses, reputational damage, and regulatory non-compliance, particularly under GDPR requirements for data protection. The vulnerability's network exploitability increases the risk of remote attacks, potentially affecting distributed environments and cloud-connected IBM i instances. Organizations in sectors such as banking, manufacturing, telecommunications, and government services are particularly vulnerable, as they often rely on IBM i for core business processes. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention to prevent potential targeted attacks.
Mitigation Recommendations
1. Monitor IBM's official security advisories closely and apply patches or updates as soon as they become available to address CVE-2025-36367. 2. Until patches are released, restrict access to IBM i SQL services to only trusted and necessary users and systems, using network segmentation and firewall rules. 3. Implement strict access controls and least privilege principles for all user profiles on IBM i systems to minimize the risk of privilege escalation. 4. Enable detailed logging and monitoring of SQL service usage and privilege escalation attempts to detect suspicious activities early. 5. Conduct regular security audits and vulnerability assessments focused on IBM i environments to identify and remediate potential weaknesses. 6. Educate system administrators and security teams about this vulnerability and the importance of rapid response. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous IBM i SQL service behavior. 8. Review and harden IBM i system configurations, disabling unnecessary services and interfaces to reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:55.332Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905f7d9b1eaf3d2f0fca9cf
Added to database: 11/1/2025, 12:06:49 PM
Last enriched: 11/10/2025, 1:46:24 AM
Last updated: 12/16/2025, 5:07:55 PM
Views: 316
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-50401: n/a
UnknownCVE-2025-50398: n/a
UnknownCVE-2024-33612: CWE-295 Improper Certificate Validation in F5 BIG-IP Next Central Manager
MediumCVE-2024-33006: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP NetWeaver Application Server ABAP and ABAP Platform
CriticalCVE-2024-30274: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Painter
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.