Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36367: CWE-862 Missing Authorization

0
High
VulnerabilityCVE-2025-36367cvecve-2025-36367cwe-862
Published: Sat Nov 01 2025 (11/01/2025, 12:01:31 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:47:33 UTC

Technical Analysis

CVE-2025-36367 is a vulnerability classified under CWE-862 (Missing Authorization) that affects IBM i operating system versions 7.2 through 7.6. The flaw arises from an invalid authorization check within IBM i SQL services, which fails to properly verify user privileges before allowing certain operations. This security gap enables a malicious actor who already has some level of access (with limited privileges) to leverage the elevated privileges of another user profile, ultimately gaining root-level access to the host operating system. Root access on IBM i systems equates to full administrative control, allowing attackers to manipulate system configurations, access sensitive data, install persistent malware, or disrupt services. The vulnerability does not require user interaction and can be exploited remotely (CVSS vector AV:N), with low attack complexity (AC:L) and privileges required (PR:L). The scope is unchanged (S:U), meaning the exploit affects only the vulnerable component but with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability's nature and severity make it a critical concern for organizations relying on IBM i platforms. IBM has not yet released patches, so mitigation currently relies on compensating controls and monitoring.

Potential Impact

The impact of CVE-2025-36367 is severe for organizations using IBM i systems, which are often deployed in critical business environments such as finance, manufacturing, and government. Successful exploitation grants attackers root access, enabling full control over the host OS. This can lead to unauthorized data access or exfiltration, system manipulation, installation of persistent backdoors, disruption of business operations, and potential compliance violations. The vulnerability compromises confidentiality, integrity, and availability simultaneously. Given IBM i's role in enterprise resource planning and transaction processing, exploitation could result in significant financial loss, reputational damage, and operational downtime. The lack of required user interaction and low complexity of exploitation increase the risk of automated or targeted attacks. Organizations without timely mitigation may face escalated threats from insider attackers or external adversaries who have initial footholds.

Mitigation Recommendations

Until IBM releases official patches, organizations should implement strict access controls to limit the number of users with privileges that could be leveraged for escalation. Conduct thorough audits of user profiles and permissions to detect and remove excessive privileges. Employ network segmentation to isolate IBM i systems from less trusted networks and restrict remote access to trusted administrators only. Monitor system logs and SQL service activities for unusual privilege escalations or suspicious behavior. Use intrusion detection and prevention systems tailored for IBM i environments to detect exploitation attempts. Prepare for rapid deployment of patches once available by establishing robust change management processes. Additionally, consider deploying application whitelisting and endpoint protection solutions that can detect anomalous root-level activities. Regularly back up critical data and system configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905f7d9b1eaf3d2f0fca9cf

Added to database: 11/1/2025, 12:06:49 PM

Last enriched: 2/27/2026, 1:47:33 AM

Last updated: 3/24/2026, 7:06:17 PM

Views: 512

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses