Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36367: CWE-862 Missing Authorization

0
High
VulnerabilityCVE-2025-36367cvecve-2025-36367cwe-862
Published: Sat Nov 01 2025 (11/01/2025, 12:01:31 UTC)
Source: CVE Database V5
Vendor/Project: IBM

Description

IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.

AI-Powered Analysis

AILast updated: 11/01/2025, 12:07:06 UTC

Technical Analysis

CVE-2025-36367 is a critical vulnerability identified in IBM i operating system versions 7.2 through 7.6, caused by a missing authorization check in the IBM i SQL services. Specifically, the flaw allows a user with limited privileges to leverage the elevated privileges of another user profile improperly, resulting in privilege escalation to root-level access on the host OS. This vulnerability is categorized under CWE-862 (Missing Authorization), indicating that the system fails to properly verify whether a user is authorized to perform certain actions. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring only privileges of a low-level user (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as an attacker gaining root access can fully control the system, access sensitive data, modify or delete data, and disrupt services. Although no known exploits have been reported in the wild yet, the severity score of 8.8 (CVSS v3.1) highlights the critical nature of this vulnerability. IBM i systems are widely used in enterprise environments, particularly in sectors such as finance, manufacturing, and government, where system integrity and data confidentiality are paramount. The vulnerability arises from an invalid authorization check in SQL services, which are commonly used for database operations, making the attack vector plausible in environments where SQL services are accessible to users with limited privileges. The absence of a patch link suggests that remediation may still be pending or in development, underscoring the need for immediate risk mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-36367 is significant due to the widespread use of IBM i systems in critical industries such as banking, manufacturing, telecommunications, and government agencies. Successful exploitation would allow attackers to gain root access, leading to full system compromise. This can result in unauthorized data disclosure, data tampering, service disruption, and potential lateral movement within networks. The breach of confidentiality and integrity could undermine regulatory compliance obligations under GDPR and other data protection laws, exposing organizations to legal and financial penalties. Additionally, availability impacts could disrupt essential business operations and critical infrastructure services. The high severity and network exploitability increase the risk of targeted attacks or insider threats leveraging this vulnerability. European organizations with interconnected supply chains and critical infrastructure are particularly vulnerable to cascading effects from such a compromise.

Mitigation Recommendations

1. Monitor IBM’s official security advisories closely and apply patches or security updates as soon as they become available to address CVE-2025-36367. 2. Until patches are released, restrict access to IBM i SQL services to only trusted and necessary user accounts, employing network segmentation and firewall rules to limit exposure. 3. Implement strict access controls and regularly audit user privileges to detect and remove unnecessary elevated permissions that could be exploited. 4. Enable detailed logging and monitoring of SQL service usage and privilege escalation attempts to detect suspicious activities early. 5. Employ intrusion detection/prevention systems (IDS/IPS) tuned to identify anomalous behavior related to privilege escalation on IBM i systems. 6. Conduct regular security assessments and penetration testing focused on IBM i environments to identify and remediate potential weaknesses. 7. Educate system administrators and security teams about this vulnerability and the importance of rapid response to privilege escalation indicators. 8. Consider deploying application whitelisting and endpoint protection solutions that can prevent unauthorized execution of elevated commands on IBM i hosts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905f7d9b1eaf3d2f0fca9cf

Added to database: 11/1/2025, 12:06:49 PM

Last enriched: 11/1/2025, 12:07:06 PM

Last updated: 11/1/2025, 3:46:31 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats