Sploit.io - Search

Product: i, version: 7.2, 7.3, 7.4, 7.5

CVE-2023-23470

Severity: HIGH

Description: IBM i 7.2, 7.3, 7.4, and 7.5 could allow an authenticated privileged administrator to gain elevated privileges in non-default configurations, as a result of improper SQL processing. By using a specially crafted SQL operation, the administrator could exploit the vulnerability to perform additional administrator operations. IBM X-Force ID: 244510.

CVSS Score: 6.4

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.001010000
  • Percentile: 0.275470000
  • Date: 2026-04-29

ExploitDB

No data available.

HackerOne Data

  • Rank: 9223
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2023-23470, affects IBM i operating systems versions 7.2, 7.3, 7.4, and 7.5. It’s a privilege escalation vulnerability stemming from improper SQL processing. An authenticated, privileged administrator can leverage a specifically crafted SQL operation to gain elevated privileges beyond their normal access. The base CVSS score is 6.4 (Medium), indicating a moderate level of risk. However, the impact is significant, with high potential for compromise of confidentiality, integrity, and availability. The attack vector is local, requiring the attacker to already have privileged administrative access, which moderately limits the likelihood. The attack complexity is high, meaning the attacker needs to construct a specific SQL operation, increasing the ease of exploitation slightly. The EPSS score of 0.001010000 suggests a relatively low, but not insignificant, probability of exploitation in the wild. The business impact could range from data breaches and system corruption to service disruptions, depending on the administrator's access and the criticality of the affected systems.

    2. Potential Attack Scenarios
    An attacker, already possessing privileged administrator credentials on an IBM i system, could exploit this vulnerability to gain complete control. The attack scenario would unfold as follows: The attacker crafts a specific SQL query designed to bypass normal privilege checks. This query is then executed within the IBM i database environment. The improperly processed SQL allows the attacker to perform operations typically reserved for the highest level of administrative access, such as creating new users with full system control or modifying critical system settings. The outcome is the attacker gaining full control over the IBM i system, potentially leading to data exfiltration, system corruption, or denial of service. The attacker could leverage this control to compromise related applications and data residing on the IBM i platform.

    3. Mitigation Recommendations
    The primary mitigation is to apply the latest IBM i fixes as outlined in the vendor advisory. IBM recommends applying PTF (Program Temporary Fix) packages to address the improper SQL processing. Specifically, consult IBM support page https://www.ibm.com/support/pages/node/6987767 for the relevant PTFs for your specific IBM i version. Immediate action should be taken to patch all affected systems. As a short-term mitigation, administrators should carefully review and validate all SQL operations performed, especially those executed with elevated privileges. Consider implementing stricter SQL auditing to detect unusual or potentially malicious SQL queries. Regularly review administrator access rights to ensure they are aligned with the principle of least privilege.

    4. Executive Summary
    CVE-2023-23470 is a medium-severity vulnerability affecting IBM i operating systems that could allow a privileged administrator to gain elevated control of the system through a specially crafted SQL operation. While requiring existing privileged access, the potential impact is significant, potentially leading to data breaches, system corruption, and service disruptions. We recommend applying the latest IBM i patches as soon as possible to mitigate this risk. This vulnerability poses a moderate threat to our organization, and prompt patching is crucial to protect our IBM i systems and the data they contain. Failure to address this vulnerability could lead to substantial business disruption and potential financial loss.

    CVE-2023-30988

    Severity: HIGH

    Description: The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 254016.

    CVSS Score: 8.4

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.000230000
    • Percentile: 0.063060000
    • Date: 2026-04-25

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9178
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, CVE-2023-30988, is a local privilege escalation flaw within the Facsimile Support for i component of IBM i operating systems versions 7.2, 7.3, 7.4, and 7.5. The vulnerability allows a malicious actor with command line access to the host operating system to escalate their privileges to root level. This is considered a HIGH severity vulnerability with a CVSS score of 8.4, indicating significant potential impact. The likelihood of exploitation is moderate, as it requires existing command line access, but the ease of exploitation is relatively low, meaning once access is gained, escalating privileges is straightforward. The impact on Confidentiality, Integrity, and Availability is all HIGH, as a root-level compromise allows full control over the system and its data. The EPSS score of 0.00023 suggests the vulnerability is relatively rare, but the potential impact is substantial if exploited. The core risk stems from a failure in proper privilege management (CWE-269). Business impact could include data breaches, system downtime, and disruption of critical applications relying on the IBM i system.

      2. Potential Attack Scenarios
      A potential attack scenario involves an attacker gaining initial command line access to an IBM i system, perhaps through a less privileged user account or a compromised application running on the system. The attacker then leverages the vulnerability in Facsimile Support for i to elevate their privileges to root. This could be achieved through a specifically crafted command or by exploiting a weakness in the way the Facsimile Support component handles certain operations. Once root access is gained, the attacker can install backdoors, exfiltrate sensitive data, modify system configurations, or even cause a denial of service, effectively taking full control of the IBM i system. The attacker could target specific files or databases based on the system’s role and the data it stores. For example, if the IBM i system manages financial data, the attacker could steal critical financial records.

      3. Mitigation Recommendations
      The primary mitigation for CVE-2023-30988 is to apply the patch provided by IBM. IBM has released updates for the affected versions of the i operating system to address this vulnerability. Ensure the patching process is performed during a maintenance window to minimize disruption to business operations. It is recommended to review the IBM support documentation for detailed patching instructions specific to your environment. Additionally, implement least privilege principles wherever possible, limiting command line access to only those users who require it. Regularly audit user accounts and permissions to identify and remove unnecessary privileges. Monitor system logs for suspicious activity, particularly after the patch has been applied, to confirm successful mitigation and detect potential exploitation attempts.

      Relevant Resources:
      IBM Support Page: https://www.ibm.com/support/pages/node/7012355
      IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/254016

      4. Executive Summary
      CVE-2023-30988 is a HIGH severity vulnerability in IBM i that allows a local attacker to gain root access to the system. While exploitation requires initial command line access, the impact of a successful attack is significant – potentially leading to data breaches, system downtime, and disruption of critical business functions. The vulnerability resides in the Facsimile Support for i component and affects versions 7.2, 7.3, 7.4, and 7.5. The most effective mitigation is to apply the patch released by IBM as quickly as possible. Failure to address this vulnerability could result in substantial financial and reputational damage. It is crucial to prioritize patching this vulnerability to protect sensitive data and maintain the stability of your IBM i systems. A swift response is recommended given the potential for complete system compromise.

      CVE-2023-30989

      Severity: HIGH

      Description: IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain all object access to the host operating system. IBM X-Force ID: 254017.

      CVSS Score: 8.4

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.000230000
      • Percentile: 0.063060000
      • Date: 2026-04-25

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9178
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability CVE-2023-30989 is a local privilege escalation flaw within IBM Performance Tools for i versions 7.2 through 7.5. The core of the risk lies in a malicious actor gaining full object access to the host operating system with relatively low effort, given command line access. This vulnerability has a CVSS score of 8.4 (HIGH), indicating a significant risk. The likelihood of exploitation is moderate to high, assuming attackers have access to the host system. The ease of exploitation is considered low as it requires local command line access, but once gained, escalation is straightforward. The potential impact on confidentiality, integrity, and availability is high. A successful exploit allows attackers to read sensitive data, modify system files, and potentially disrupt operations. The EPSS score of 0.000230000 indicates a relatively low, but non-negligible, probability of exploitation given the prevalence of affected systems. Business impact could range from data breaches and system corruption to downtime and loss of productivity.

        2. Potential Attack Scenarios
        An attacker gains command line access to an IBM i system running Performance Tools, perhaps through a compromised user account or a less secure service. The attacker leverages the privilege escalation vulnerability to elevate their privileges from a standard user to a user with full object access. Once elevated, the attacker can install malicious software, exfiltrate sensitive data from the IBM i system, or modify critical system files. The attacker could then potentially leverage the compromised IBM i system as a jumping-off point for further attacks within the network. Specifically, the attacker could modify the QSYS library, impacting core system functions, or install a backdoor for persistent access. This scenario relies on initial local access but significantly amplifies the impact of that access.

        3. Mitigation Recommendations
        The primary mitigation for CVE-2023-30989 is to apply the patch provided by IBM. The specific patch or fix version depends on the exact version of IBM Performance Tools for i being used. Refer to IBM’s official security bulletin for detailed patching instructions: https://www.ibm.com/support/pages/node/7012353. In the short term, limit command line access to the host operating system to trusted users and groups. Implement strong password policies and multi-factor authentication wherever possible. Regularly review user accounts and privileges to ensure they align with the principle of least privilege. Monitor system logs for unusual activity, specifically looking for privilege escalations or unexpected access to critical system files. Consider implementing intrusion detection systems (IDS) to detect and alert on potential exploitation attempts.

        4. Executive Summary
        IBM Performance Tools for i is vulnerable to a high-severity privilege escalation flaw (CVE-2023-30989). A malicious actor with command line access can gain full control of the host operating system, potentially leading to data breaches, system corruption, and disruption of operations. The risk is significant, and prompt action is recommended. We advise applying the IBM-provided patch as soon as possible. Limiting command line access and strengthening user authentication will provide additional protection. Addressing this vulnerability is crucial to maintaining the confidentiality, integrity, and availability of data and systems running IBM Performance Tools for i. Failure to address this vulnerability could result in significant business impact.

        CVE-2023-30990

        Severity: HIGH

        Description: IBM i 7.2, 7.3, 7.4, and 7.5 could allow a remote attacker to execute CL commands as QUSER, caused by an exploitation of DDM architecture. IBM X-Force ID: 254036.

        CVSS Score: 8.6

        Priority

        A+

        CISA Data

        EPSS Data

        • EPSS: 0.001840000
        • Percentile: 0.399450000
        • Date: 2026-04-25

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 9178
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

        References:

        Risk Assessment

        1. Risk Assessment
        CVE-2023-30990 represents a high-risk vulnerability affecting IBM i operating systems versions 7.2, 7.3, 7.4, and 7.5. The vulnerability stems from improper control of code generation within the DDM (Distributed Database Manager) architecture, allowing a remote attacker to execute CL (Control Language) commands as the QUSER. QUSER is a powerful, commonly used user profile with significant privileges on IBM i systems. The CVSS score of 8.6 (HIGH) and a relatively low attack complexity indicate a significant threat. The vulnerability's impact is substantial; a successful exploit leads to high availability impact, with low impacts to confidentiality and integrity. The EPSS score of 0.001840000 suggests a relatively low but non-negligible probability of exploitation. The likelihood of exploitation is considered moderate, given the network accessibility and relatively low attack complexity. The ease of exploitation is also moderate, as several exploits have been published and are available on GitHub and PacketStorm, indicating active interest and demonstrated exploitation capability. Business impact could range from service disruptions to potential data compromise, depending on the specific CL commands executed by the attacker.

        2. Potential Attack Scenarios
        A potential attack scenario involves a remote attacker exploiting the DDM architecture to gain command execution as QUSER. The attacker begins by sending a crafted DDM request to the vulnerable IBM i system. This request leverages the improper code generation control to inject malicious CL commands. Upon processing the request, the IBM i system executes the injected commands with QUSER privileges. The attacker could then use these privileges to create new user profiles with full administrative access, modify critical system files, disrupt key business processes, or extract sensitive data. For example, an attacker could use the QUSER context to create a new user profile with *ALLOBJ authority, granting them complete access to all objects on the system. This allows them to steal critical data, modify system configurations, or even install a backdoor for persistent access.

        3. Mitigation Recommendations
        The primary mitigation for CVE-2023-30990 is to apply the official IBM fix for the vulnerability. IBM provides specific PTF (Program Temporary Fix) packages for each affected IBM i version. These PTFs address the improper code generation control within the DDM architecture. Refer to IBM support pages for the specific PTF applicable to your IBM i version: https://www.ibm.com/support/pages/node/7008573. In addition to patching, consider implementing these supplementary measures: Monitor network traffic for suspicious DDM requests. Review QUSER activity logs for unusual command executions. Implement strong network segmentation to limit the attack surface. Regularly review and audit user privileges, particularly for QUSER and other highly privileged accounts. Consider enabling and configuring intrusion detection/prevention systems to detect and block malicious DDM requests.

        4. Executive Summary
        IBM i systems running versions 7.2, 7.3, 7.4, or 7.5 are vulnerable to a high-impact security flaw (CVE-2023-30990) that allows a remote attacker to execute commands with significant privileges. This means an attacker could potentially disrupt services, compromise data, or gain complete control of your IBM i system. Several exploits are already publicly available, demonstrating the vulnerability is actively being targeted. The most effective way to address this vulnerability is to install the official IBM patch for your specific IBM i version, available at https://www.ibm.com/support/pages/node/7008573. Prompt patching and ongoing monitoring of system activity are crucial to minimize the risk and protect your business from potential disruptions and data compromise. This is a high priority vulnerability that requires immediate attention.

        CVE-2023-38721

        Severity: HIGH

        Description: The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor could gain access to a command line with elevated privileges allowing root access to the host operating system. IBM X-Force ID: 262173.

        CVSS Score: 8.4

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.000210000
        • Percentile: 0.057900000
        • Date: 2026-04-23

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 9155
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability CVE-2023-38721 is a local privilege escalation flaw within the Facsimile Support for i component of IBM i versions 7.2, 7.3, 7.4, and 7.5. The vulnerability allows a malicious actor with local access to the IBM i system to gain elevated privileges, ultimately achieving root access. The CVSS score of 8.4 (HIGH) indicates a significant risk. The likelihood of exploitation is moderate, as it requires local access to the system, but the ease of exploitation is considered low due to the need to leverage the specific Facsimile Support for i functionality. The impact on confidentiality, integrity, and availability is high, as a successful attacker with root access can compromise all three aspects of the system. This vulnerability poses a significant risk to organizations relying on the IBM i platform, particularly if the system handles sensitive data or supports critical business processes. The EPSS score of 0.000210000 suggests a relatively low, but present, probability of exploitation in the wild.

          2. Potential Attack Scenarios
          An attacker who has already gained local access to an IBM i system – perhaps through a compromised user account or a vulnerability in another application – can leverage the Facsimile Support for i vulnerability to escalate their privileges to root. The attack process would involve exploiting the flaw within the Facsimile Support component, potentially through a crafted request or a specific sequence of operations. This allows the attacker to execute commands with elevated privileges, eventually gaining full root access. With root access, the attacker could then steal sensitive data, modify system configurations, install malware, or disrupt critical business operations. The attacker could potentially establish persistence, maintaining access to the system even after the initial access point is remediated. This scenario is particularly impactful for systems used for core business functions like financials or supply chain management.

          3. Mitigation Recommendations
          The primary mitigation for CVE-2023-38721 is to apply the patch provided by IBM. IBM has released updates for the affected IBM i versions (7.2, 7.3, 7.4, and 7.5) to address the vulnerability. Organizations should prioritize patching based on the criticality of the IBM i system and the sensitivity of the data it manages. Immediate actions include reviewing the IBM support page for detailed patching instructions: https://www.ibm.com/support/pages/node/7023423. In the short-term, organizations can limit local access to the IBM i system to trusted users and administrators. Monitor system logs for unusual activity, particularly related to the Facsimile Support for i component. Consider implementing least privilege principles to restrict user access to only the resources they need. Regularly review user accounts and permissions to ensure they are up-to-date and appropriate.

          4. Executive Summary
          CVE-2023-38721 is a high-severity vulnerability affecting IBM i systems running versions 7.2 through 7.5. This vulnerability allows an attacker with local access to escalate their privileges to root, potentially compromising the confidentiality, integrity, and availability of the system. A successful attack could lead to data breaches, system disruptions, and significant business impact. The vulnerability lies within the Facsimile Support for i component. We recommend prioritizing patching to the latest version as the primary mitigation. Limiting local access and monitoring system logs are also important steps. Addressing this vulnerability is crucial to maintain the security and reliability of IBM i systems and protect critical business data. Prompt action is recommended to minimize the risk of exploitation.

          CVE-2023-40375

          Severity: HIGH

          Description: Integrated application server for IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 263580.

          CVSS Score: 7.4

          Priority

          B

          CISA Data

          EPSS Data

          • EPSS: 0.000200000
          • Percentile: 0.055770000
          • Date: 2026-04-22

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 9144
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

            References:

            Risk Assessment

            1. Risk Assessment
            The vulnerability CVE-2023-40375 is a local privilege escalation flaw in the integrated application server for IBM i versions 7.2, 7.3, 7.4, and 7.5. This means an attacker who already has command line access to the IBM i system – but doesn’t necessarily have elevated privileges – can exploit this vulnerability to gain root access. The CVSS score of 7.4 (High) indicates a significant risk. The attack complexity is rated as High, meaning the exploit may not be trivial to execute but is achievable with reasonable effort. The vulnerability impacts confidentiality, integrity, and availability, as a root-level attacker can access all system resources, modify data, and potentially disrupt services. The EPSS score of 0.000200000 suggests a relatively low probability of exploitation in the wild, but the potential impact is substantial given the full control a root-level attacker can achieve. The business impact could range from data breaches and system corruption to service outages and compromised business operations, depending on the specific role and data accessed by the compromised system.

            2. Potential Attack Scenarios
            An attacker gains command line access to an IBM i system, perhaps through a vulnerable application or a compromised user account. The attacker then leverages CVE-2023-40375 to elevate their privileges to root. Once root access is achieved, the attacker can install a backdoor, exfiltrate sensitive data, modify system configurations, or disrupt services. For example, an attacker could install a keylogger to capture credentials for other systems, or they could modify critical system files to cause a denial of service. The attack vector is local, requiring the attacker to already have some foothold on the system, but the privilege escalation allows them to move from a limited user to full control. Another scenario involves an internally compromised system. An attacker gains access through a less critical application and uses the vulnerability to escalate privileges, allowing them to move laterally across the network and compromise additional systems.

            3. Mitigation Recommendations
            The primary mitigation for CVE-2023-40375 is to apply the patch released by IBM. IBM provides detailed instructions on how to apply the fix, depending on the specific version of IBM i in use. Refer to the IBM support page for detailed instructions: https://www.ibm.com/support/pages/node/7038748. In addition to patching, consider implementing the principle of least privilege. Limit the command line access granted to users and applications to only what is necessary. Regularly review user permissions and access controls. Monitor system logs for suspicious activity, particularly privilege escalation attempts. Implement strong authentication mechanisms, such as multi-factor authentication, to reduce the likelihood of initial compromise. Consider utilizing vulnerability scanning tools to identify systems vulnerable to CVE-2023-40375.

            4. Executive Summary
            CVE-2023-40375 is a high-severity vulnerability affecting IBM i versions 7.2 through 7.5. A malicious actor with command line access can escalate their privileges to root, gaining full control of the system. This could lead to data breaches, system corruption, or service outages. While the likelihood of exploitation may be relatively low, the potential impact is significant. We strongly recommend applying the IBM-provided patch as soon as possible to mitigate this risk. Limiting command line access and regularly monitoring system logs will further enhance security. Addressing this vulnerability is crucial to protecting the confidentiality, integrity, and availability of our IBM i systems and the business data they contain. Prompt patching and careful access control are vital to minimize the risk of a successful attack.

            CVE-2023-40378

            Severity: MEDIUM

            Description: IBM Directory Server for IBM i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain component access to the host operating system. IBM X-Force ID: 263584.

            CVSS Score: 4.9

            Priority

            D

            CISA Data

            EPSS Data

            • EPSS: 0.000240000
            • Percentile: 0.064550000
            • Date: 2026-04-22

            ExploitDB

            No data available.

            HackerOne Data

            • Rank: 9139
            • Reports submitted count: 0
            • Unknown: 0
            • None: 0
            • Low: 0
            • Medium: 0
            • High: 0
            • Critical: 0

            GitHub PoCs

              Nuclei Templates

              No data available.

              VulnCheck Data

              Affected Products:

              • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

              References:

              Risk Assessment

              1. Risk Assessment
              The vulnerability CVE-2023-40378 is a local privilege escalation vulnerability within IBM Directory Server for IBM i. This means an attacker with existing command line access to the host operating system can elevate their privileges to gain component access, potentially granting them broader control than initially intended. The base score of 4.9 (Medium) indicates a moderate risk. While exploitation requires local access, the attack complexity is high, meaning it’s not trivial to exploit and likely requires some understanding of the system. The impact on confidentiality, integrity, and availability is rated as Low for each. This suggests the attacker gains limited access to data, can make limited modifications, and can cause minor disruptions. The EPSS score of 0.00024 represents a relatively low probability of exploitation in the wild, but it's still significant enough to warrant attention, especially for systems with valuable data or critical functionality. The business impact could range from minor data compromise to service disruptions, depending on the attacker's ultimate goal and the specific system configuration.

              2. Potential Attack Scenarios
              An attacker gains command line access to an IBM i server via SSH, perhaps using compromised credentials or through a less privileged account. They then leverage the local privilege escalation vulnerability in IBM Directory Server to escalate their privileges to a component access level. From there, the attacker can access more sensitive data stored within the directory server, potentially including user credentials, configuration details, or application data. They could then use this information to further compromise the system or move laterally within the network. The attacker might install a backdoor for persistent access, or modify directory server configurations to intercept authentication requests. The impact could include data exfiltration, service disruption, or even full system compromise if the attacker can chain this escalation with other vulnerabilities.

              3. Mitigation Recommendations
              The primary mitigation for CVE-2023-40378 is to apply the latest patch or fix released by IBM. The IBM support page provides details on the applicable fix levels for the affected versions (7.2, 7.3, 7.4, 7.5). Immediately prioritize patching systems that are exposed to more risk, such as those holding critical data or serving publicly-facing applications. Beyond patching, consider implementing least privilege access controls, ensuring users only have the necessary permissions to perform their tasks. Regularly review and audit user accounts and permissions. Monitor system logs for suspicious activity, such as unexpected privilege escalations. Further information and the official fix can be found at https://www.ibm.com/support/pages/node/7047240 and details of the vulnerability are available at https://exchange.xforce.ibmcloud.com/vulnerabilities/263584.

              4. Executive Summary
              IBM Directory Server for IBM i is affected by a local privilege escalation vulnerability (CVE-2023-40378), allowing an attacker with command line access to gain increased privileges on the system. While the risk is currently assessed as Medium, a successful exploit could lead to data compromise, service disruptions, or further system compromise. The vulnerability isn’t widely exploited currently, but patching should be prioritized to reduce risk. We recommend applying the latest IBM patch to affected systems (versions 7.2, 7.3, 7.4, and 7.5) as soon as possible. This vulnerability impacts our ability to maintain the confidentiality, integrity, and availability of data stored within the IBM Directory Server. Proactive patching and ongoing monitoring will minimize the risk and ensure continued business operations.

              CVE-2023-40685

              Severity: HIGH

              Description: Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain root access to the operating system. IBM X-Force ID: 264116.

              CVSS Score: 7.4

              Priority

              B

              CISA Data

              EPSS Data

              • EPSS: 0.000210000
              • Percentile: 0.057680000
              • Date: 2026-04-22

              ExploitDB

              No data available.

              HackerOne Data

              • Rank: 9144
              • Reports submitted count: 0
              • Unknown: 0
              • None: 0
              • Low: 0
              • Medium: 0
              • High: 0
              • Critical: 0

              GitHub PoCs

                Nuclei Templates

                No data available.

                VulnCheck Data

                Affected Products:

                • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                References:

                Risk Assessment

                1. Risk Assessment
                The vulnerability CVE-2023-40685 is a local privilege escalation flaw within IBM i Management Central Navigator affecting versions 7.2, 7.3, 7.4, and 7.5. The nature of the vulnerability allows a malicious actor with existing command line access to the IBM i operating system to elevate their privileges to root level. The CVSS score of 7.4 (HIGH) indicates a significant risk. While exploitation requires local access, the high impact across Confidentiality, Integrity, and Availability suggests a successful exploit could lead to full system compromise. The attack complexity is rated as High, meaning the exploit may not be trivial, but still achievable by a moderately skilled attacker. The EPSS score of 0.000210000 suggests a relatively low but non-negligible probability of exploitation in the wild. Business impact could range from data breaches and system outages to disruption of critical business processes depending on the role of the affected IBM i system.

                2. Potential Attack Scenarios
                An attacker gains initial command line access to an IBM i system, perhaps through a compromised user account with limited privileges or through a service running with insufficient permissions. The attacker then leverages the CVE-2023-40685 vulnerability to escalate their privileges to root. Once root access is achieved, the attacker can install backdoors, exfiltrate sensitive data, modify system configurations, or disrupt system operations. This could lead to a full compromise of the IBM i system and its associated applications, potentially impacting core business functions like order processing, financial reporting, or manufacturing control. The attacker could even use the compromised system as a stepping stone to further compromise the network.

                3. Mitigation Recommendations
                The primary mitigation for CVE-2023-40685 is to apply the patch provided by IBM. IBM has released updated versions of Management Central to address this vulnerability. Administrators should prioritize patching systems running IBM i Navigator. Review IBM’s security bulletin for detailed installation instructions: https://www.ibm.com/support/pages/node/7060686. In addition to patching, consider the following: Implement least privilege access control, ensuring users only have the necessary permissions to perform their tasks. Regularly review and audit user accounts and permissions. Monitor system logs for suspicious activity, especially after patching to confirm successful implementation and to detect any potential exploitation attempts. Consider employing intrusion detection systems (IDS) and intrusion prevention systems (IPS) to identify and block malicious activity.

                4. Executive Summary
                IBM i systems running versions 7.2 through 7.5 are affected by a vulnerability (CVE-2023-40685) that allows a local attacker to gain root access. This means someone with basic access to the system could potentially take full control. While the exploit isn’t necessarily easy, the impact of a successful attack is high, potentially leading to data breaches, system downtime, and disruption of critical business processes. We recommend immediate patching of all affected IBM i systems using the update available from IBM: https://www.ibm.com/support/pages/node/7060686. Prompt action is crucial to minimize risk and ensure the continued security and reliability of our IBM i environment. Delaying patching increases the chance of a successful attack and potential business disruption.

                CVE-2023-40686

                Severity: MEDIUM

                Description: Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain component access to the operating system. IBM X-Force ID: 264114.

                CVSS Score: 4.9

                Priority

                D

                CISA Data

                EPSS Data

                • EPSS: 0.000240000
                • Percentile: 0.067600000
                • Date: 2026-04-22

                ExploitDB

                No data available.

                HackerOne Data

                • Rank: 9143
                • Reports submitted count: 0
                • Unknown: 0
                • None: 0
                • Low: 0
                • Medium: 0
                • High: 0
                • Critical: 0

                GitHub PoCs

                  Nuclei Templates

                  No data available.

                  VulnCheck Data

                  Affected Products:

                  • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                  References:

                  Risk Assessment

                  1. Risk Assessment
                  The vulnerability CVE-2023-40686 is a local privilege escalation flaw within IBM i Navigator’s Management Central component affecting versions 7.2, 7.3, 7.4, and 7.5. The vulnerability allows a malicious actor with existing command line access on the system to elevate their privileges to gain component access. While the base score is medium (4.9), the attack complexity is high, meaning exploitation isn’t trivial and requires some level of knowledge of the system. The vulnerability impacts confidentiality, integrity, and availability, though at a low level for each. A successful exploit could allow an attacker to access sensitive data, modify system configurations, or disrupt services. The EPSS score of 0.00024 suggests the vulnerability isn't widely exploited in the wild currently, but it still presents a risk, particularly in environments where command line access is granted to a broader range of users or processes. The business impact ranges from data breaches to service disruptions, depending on the scope of access granted after privilege escalation.

                  2. Potential Attack Scenarios
                  An attacker gains command line access to an IBM i 7.4 system via SSH, using credentials obtained through password cracking or phishing. The attacker then leverages CVE-2023-40686 to escalate their privileges from a standard user to a component access level. With component access, the attacker can then modify key system configurations, install malicious software, or exfiltrate sensitive data stored on the IBM i system. This data could include customer records, financial information, or proprietary business data. The attacker could then use the compromised system as a launching point for lateral movement within the network, further expanding their reach.

                  3. Mitigation Recommendations
                  The primary mitigation for CVE-2023-40686 is to apply the patch released by IBM. The latest fix can be found in IBM’s support documentation: https://www.ibm.com/support/pages/node/7060686. As an immediate action, organizations should review and restrict command line access to the IBM i system, granting access only to those users and processes that require it. Implement strong password policies and multi-factor authentication for all accounts with command line access. Regularly audit user privileges and access logs to identify any anomalous activity. Consider using a vulnerability management solution to scan for CVE-2023-40686 and other vulnerabilities across the environment.

                  4. Executive Summary
                  IBM i Navigator contains a vulnerability (CVE-2023-40686) that allows a user with existing command line access on the system to gain higher-level privileges. This could lead to unauthorized access to sensitive data, modifications to system settings, or disruptions to critical services. While the vulnerability requires some level of expertise to exploit, the potential impact to the business is significant. We recommend patching all affected IBM i systems (versions 7.2, 7.3, 7.4, and 7.5) as soon as possible, and reviewing command line access to minimize the attack surface. Prompt action will help protect valuable data and ensure the continued availability of critical business processes.

                  CVE-2023-42006

                  Severity: HIGH

                  Description: IBM Administration Runtime Expert for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information caused by improper authority checks. IBM X-Force ID: 265266.

                  CVSS Score: 8.4

                  Priority

                  B

                  CISA Data

                  EPSS Data

                  • EPSS: 0.000280000
                  • Percentile: 0.079850000
                  • Date: 2026-04-14

                  ExploitDB

                  No data available.

                  HackerOne Data

                  • Rank: 9092
                  • Reports submitted count: 0
                  • Unknown: 0
                  • None: 0
                  • Low: 0
                  • Medium: 0
                  • High: 0
                  • Critical: 0

                  GitHub PoCs

                    Nuclei Templates

                    No data available.

                    VulnCheck Data

                    Affected Products:

                    • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                    References:

                    Risk Assessment

                    1. Risk Assessment
                    The vulnerability CVE-2023-42006 affects IBM Administration Runtime Expert for i versions 7.2 through 7.5. The core issue is improper authority checks, allowing a local user to obtain sensitive information. The CVSS score of 8.4 (HIGH) indicates a significant risk. The vulnerability is relatively easy to exploit (Low Attack Complexity) and requires no user interaction. The impact is high across all three key areas: Confidentiality (sensitive information disclosure), Integrity (potential for modification based on disclosed info), and Availability (potentially disrupt operations if sensitive information is critical). The EPSS score of 0.000280000 suggests a low, but non-negligible probability of exploitation in the wild. The business impact could range from exposure of configuration details to potential compromise of underlying systems depending on the sensitivity of the information exposed. Given the local scope, the vulnerability is most relevant to systems where local access, even by relatively trusted users, could lead to broader compromise.

                    2. Potential Attack Scenarios
                    A potential attack scenario involves a local user, perhaps a system administrator with limited privileges, leveraging the improper authority checks to access sensitive configuration information stored within the IBM Administration Runtime Expert for i. The attacker gains local access to the system, perhaps via SSH or a terminal session. They then utilize the Administration Runtime Expert to browse or query system settings, and due to the vulnerability, they are able to access information they shouldn't normally have permission to see – potentially including passwords, API keys, or details of connected systems. This information can then be used to escalate privileges, move laterally within the network, or directly compromise other systems. The outcome could be a complete system takeover or data breach, depending on the specific information exposed.

                    3. Mitigation Recommendations
                    The primary mitigation for CVE-2023-42006 is to apply the patch provided by IBM. IBM has released updates for versions 7.2, 7.3, 7.4, and 7.5 to correct the improper authority checks. The following links provide access to the relevant updates and documentation:
                    https://www.ibm.com/support/pages/node/7085891
                    https://exchange.xforce.ibmcloud.com/vulnerabilities/265266
                    As an immediate action, restrict local access to the Administration Runtime Expert to only those users who absolutely require it. Regularly review user privileges and ensure they adhere to the principle of least privilege. Monitor system logs for unusual activity related to the Administration Runtime Expert, looking for signs of unauthorized data access. Consider implementing multi-factor authentication for all local access to further enhance security.

                    4. Executive Summary
                    IBM Administration Runtime Expert for i is vulnerable to a high-severity information disclosure issue (CVE-2023-42006). A local user can potentially access sensitive information due to insufficient authority checks. This could lead to compromised system configurations, escalated privileges, and potentially broader network compromise. The vulnerability is relatively easy to exploit and impacts the confidentiality, integrity, and availability of affected systems. We recommend patching to the latest version of IBM Administration Runtime Expert for i as soon as possible. Restricting local access and monitoring system logs are also important steps to mitigate the risk. Addressing this vulnerability is critical to protect sensitive data and ensure the continued reliable operation of IBM i systems.

                    CVE-2023-43064

                    Severity: HIGH

                    Description: Facsimile Support for IBM i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause arbitrary code to run with the privilege of the user invoking the facsimile support. IBM X-Force ID: 267689.

                    CVSS Score: 7

                    Priority

                    B

                    CISA Data

                    EPSS Data

                    • EPSS: 0.000320000
                    • Percentile: 0.092350000
                    • Date: 2026-04-26

                    ExploitDB

                    No data available.

                    HackerOne Data

                    • Rank: 9183
                    • Reports submitted count: 0
                    • Unknown: 0
                    • None: 0
                    • Low: 0
                    • Medium: 0
                    • High: 0
                    • Critical: 0

                    GitHub PoCs

                      Nuclei Templates

                      No data available.

                      VulnCheck Data

                      Affected Products:

                      • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                      References:

                      Risk Assessment

                      1. Risk Assessment
                      The vulnerability CVE-2023-43064 impacts Facsimile Support within IBM i versions 7.2, 7.3, 7.4, and 7.5. The core issue stems from an unqualified library call, allowing a local user, with relatively high complexity, to potentially gain elevated privileges. The CVSS score of 7.0 (HIGH) indicates a significant risk. While exploitation requires user interaction, the potential impact on confidentiality, integrity, and availability is high – a successful attack could lead to arbitrary code execution with the privileges of the invoking user. The EPSS score of 0.00032 suggests the vulnerability is not frequently exploited in the wild, but given the potential impact, it warrants attention. The business impact could range from data breaches and system compromise to service disruption, depending on the privileges of the user invoking the facsimile support. The likelihood of exploitation is moderate, as it requires a local user and a specific interaction with the facsimile support feature, but the high complexity means it's not a trivial exploit.

                      2. Potential Attack Scenarios
                      A potential attack scenario involves a malicious local user leveraging a vulnerable facsimile process. The attacker, already possessing a local account on the IBM i system, initiates a facsimile transmission or operation through a supported application. The unqualified library call within the facsimile support allows the attacker to inject malicious code, potentially through a crafted facsimile document or transmission parameter. This injected code then executes with the privileges of the user who initiated the facsimile operation. If that user has significant system privileges, the attacker gains a foothold for wider system compromise, potentially leading to data exfiltration, system modification, or denial of service. The attacker could, for example, use the vulnerable facsimile support to execute a script that creates a new user account with administrative privileges, effectively gaining full control of the system.

                      3. Mitigation Recommendations
                      The primary mitigation for CVE-2023-43064 is to apply the latest patch or fix released by IBM. IBM provides detailed instructions on how to apply the update for the affected IBM i versions. Refer to the following resources:
                      https://www.ibm.com/support/pages/node/7101330
                      https://exchange.xforce.ibmcloud.com/vulnerabilities/267689
                      In the interim, while patching, consider limiting access to the facsimile support feature to only those users who require it. Implement strong authentication and authorization controls for local users on the IBM i system to reduce the potential attack surface. Monitor system logs for unusual activity related to the facsimile support, looking for indications of malicious code execution or privilege escalation. Regularly review and update user privileges to adhere to the principle of least privilege.

                      4. Executive Summary
                      CVE-2023-43064 is a HIGH severity vulnerability affecting IBM i versions 7.2 through 7.5, specifically within the Facsimile Support feature. A local user can potentially gain elevated privileges by exploiting an unqualified library call, leading to possible arbitrary code execution. While exploitation requires user interaction, the impact could be significant, including data breaches, system compromise, and service disruption. The vulnerability is addressed by applying the latest IBM patch. It is crucial to patch affected systems promptly to mitigate the risk and protect valuable data and systems. Limiting access to the facsimile support and monitoring system logs can provide additional layers of protection until patching is complete. This vulnerability represents a tangible risk to business operations and requires prioritized attention.

                      CVE-2024-22346

                      Severity: HIGH

                      Description: Db2 for IBM i 7.2, 7.3, 7.4, and 7.5 infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 280203.

                      CVSS Score: 8.4

                      Priority

                      B

                      CISA Data

                      EPSS Data

                      • EPSS: 0.000430000
                      • Percentile: 0.110070000
                      • Date: 2025-01-06

                      ExploitDB

                      No data available.

                      HackerOne Data

                      • Rank: 7440
                      • Reports submitted count: 0
                      • Unknown: 0
                      • None: 0
                      • Low: 0
                      • Medium: 0
                      • High: 0
                      • Critical: 0

                      GitHub PoCs

                        Nuclei Templates

                        No data available.

                        VulnCheck Data

                        Affected Products:

                        • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                        References:

                        Risk Assessment

                        1. Risk Assessment
                        The vulnerability identified as CVE-2024-22346 is a high-severity issue with a CVSS score of 8.4. It affects IBM i systems running Db2 versions 7.2, 7.3, 7.4, and 7.5. The flaw arises from an unqualified library call, which allows a local user to escalate privileges and execute user-controlled code with administrator-level permissions. This vulnerability poses a significant risk to the confidentiality, integrity, and availability of affected systems.

                        The likelihood of exploitation is moderate, as it requires local access to the system. However, the ease of exploitation is high due to the low attack complexity and the absence of required privileges or user interaction. If exploited, this vulnerability could lead to unauthorized access to sensitive data, modification of critical system files, and disruption of services. The business impact could include data breaches, operational downtime, and reputational damage.

                        2. Potential Attack Scenarios
                        A potential attack scenario involves a malicious insider or an attacker who has gained local access to the system. The attacker could exploit the unqualified library call to inject malicious code into the system. This code would then execute with elevated privileges, allowing the attacker to gain full control over the system.

                        The attack process begins with the attacker identifying the vulnerable library call within the Db2 infrastructure. They then craft a malicious payload designed to exploit this flaw. Once executed, the payload grants the attacker administrative privileges, enabling them to access sensitive data, modify system configurations, or install additional malware. The potential outcomes include data exfiltration, system compromise, and service disruption, which could severely impact business operations.

                        3. Mitigation Recommendations
                        To mitigate this vulnerability, organizations should immediately apply the relevant patches provided by IBM. The patch addresses the unqualified library call and prevents privilege escalation. Organizations should also review and restrict local access to critical systems, ensuring that only authorized personnel have access.

                        Additionally, implementing strict access controls and monitoring for unusual activity can help detect and prevent exploitation. Regularly updating systems and applying security patches is crucial to maintaining a secure environment. For further guidance, refer to IBM's advisory at https://www.ibm.com/support/pages/node/7140499 and the X-Force Exchange entry at https://exchange.xforce.ibmcloud.com/vulnerabilities/280203.

                        4. Executive Summary
                        CVE-2024-22346 is a high-severity vulnerability affecting IBM i systems running Db2 versions 7.2 through 7.5. It allows local users to escalate privileges and execute malicious code with administrative rights, posing significant risks to data confidentiality, system integrity, and service availability.

                        Exploitation of this vulnerability could lead to severe business impacts, including data breaches, operational disruptions, and reputational harm. While exploitation requires local access, the ease of attack makes it a critical concern. Immediate action is necessary to mitigate this risk.

                        Organizations should prioritize applying the provided patches, restricting local access, and monitoring for suspicious activity. Addressing this vulnerability promptly is essential to safeguarding critical systems and maintaining business continuity.

                        CVE-2024-25050

                        Severity: HIGH

                        Description: IBM i 7.2, 7.3, 7.4, 7.5 and IBM Rational Development Studio for i 7.2, 7.3, 7.4, 7.5 networking and compiler infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privileges. IBM X-Force ID: 283242.

                        CVSS Score: 8.4

                        Priority

                        B

                        CISA Data

                        EPSS Data

                        • EPSS: 0.000450000
                        • Percentile: 0.174820000
                        • Date: 2025-01-07

                        ExploitDB

                        No data available.

                        HackerOne Data

                        • Rank: 7440
                        • Reports submitted count: 0
                        • Unknown: 0
                        • None: 0
                        • Low: 0
                        • Medium: 0
                        • High: 0
                        • Critical: 0

                        GitHub PoCs

                          Nuclei Templates

                          No data available.

                          VulnCheck Data

                          Affected Products:

                          • IBM i - Versions: 7.2, 7.3, 7.4, 7.5
                          • IBM Rational Development Studio for i - Versions: 7.2, 7.3, 7.4, 7.5

                          References:

                          Risk Assessment

                          1. Risk Assessment
                          The vulnerability identified as CVE-2024-25050 is a high-severity issue with a CVSS score of 8.4. It affects IBM i versions 7.2 through 7.5 and IBM Rational Development Studio for i versions 7.2 through 7.5. The flaw arises from an unqualified library call in the networking and compiler infrastructure, allowing a local user to escalate privileges and execute user-controlled code with administrator-level permissions.

                          The nature of this vulnerability poses a significant risk to organizations using the affected IBM systems. Since the attack vector is local, an attacker would need access to the system, but once exploited, the impact is severe. The likelihood of exploitation is moderate, as it requires local access, but the ease of exploitation is high due to the low attack complexity. The potential impacts include complete compromise of confidentiality, integrity, and availability, as an attacker could gain full control over the system, modify critical data, and disrupt operations.

                          2. Potential Attack Scenarios
                          An attacker with local access to an affected IBM i system could exploit this vulnerability to escalate privileges and execute malicious code with administrative rights. For example, an insider threat or a compromised user account could be leveraged to exploit the unqualified library call. The attacker would craft or inject malicious code into the system, which would then be executed with elevated privileges due to the vulnerability.

                          The attack process would involve the following steps: First, the attacker gains local access to the system, either through legitimate credentials or by exploiting another vulnerability. Next, they identify and exploit the unqualified library call to execute their malicious code. Once the code is executed with administrator privileges, the attacker could install backdoors, exfiltrate sensitive data, or disrupt system operations. The potential outcomes include data breaches, system downtime, and reputational damage to the organization.

                          3. Mitigation Recommendations
                          To mitigate this vulnerability, organizations should immediately apply the patches provided by IBM. The following actions are recommended:

                          - Apply the latest security updates for IBM i and IBM Rational Development Studio for i as outlined in the IBM support pages.
                          - Restrict local access to critical systems to only authorized personnel.
                          - Implement strict privilege management policies to limit the impact of potential privilege escalation attacks.
                          - Monitor system logs for unusual activity that could indicate exploitation attempts.

                          Relevant resources for patching and further information can be found at the following links:
                          https://www.ibm.com/support/pages/node/7149672
                          https://www.ibm.com/support/pages/node/7149616
                          https://exchange.xforce.ibmcloud.com/vulnerabilities/283242

                          4. Executive Summary
                          CVE-2024-25050 is a high-severity vulnerability affecting IBM i and IBM Rational Development Studio for i systems. It allows local users to escalate privileges and execute malicious code with administrative rights, posing a significant risk to data confidentiality, system integrity, and operational availability. While exploitation requires local access, the potential impact is severe, including data breaches and system compromise.

                          Organizations using affected systems should prioritize applying the provided patches and implementing strict access controls to mitigate this risk. Immediate action is critical to prevent potential exploitation and safeguard sensitive data and system operations. This vulnerability underscores the importance of maintaining up-to-date systems and adhering to robust security practices to protect against insider threats and privilege escalation attacks.

                          CVE-2024-27264

                          Severity: HIGH

                          Description: IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 284563.

                          CVSS Score: 7.4

                          Priority

                          B

                          CISA Data

                          EPSS Data

                          • EPSS: 0.000430000
                          • Percentile: 0.111280000
                          • Date: 2025-01-08

                          ExploitDB

                          No data available.

                          HackerOne Data

                          • Rank: 7440
                          • Reports submitted count: 0
                          • Unknown: 0
                          • None: 0
                          • Low: 0
                          • Medium: 0
                          • High: 0
                          • Critical: 0

                          GitHub PoCs

                            Nuclei Templates

                            No data available.

                            VulnCheck Data

                            Affected Products:

                            • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                            References:

                            Risk Assessment

                            1. Risk Assessment
                            The vulnerability identified as CVE-2024-27264 in IBM Performance Tools for i versions 7.2, 7.3, 7.4, and 7.5 is a high-severity issue with a CVSS score of 7.4. The flaw arises from an unqualified library call, which could allow a local user to escalate privileges and execute user-controlled code with administrator-level permissions. This vulnerability poses a significant risk to systems running the affected software, as it could lead to unauthorized access, data manipulation, and system compromise.

                            The likelihood of exploitation is moderate due to the requirement of local access and high attack complexity. However, if exploited, the impact is severe, affecting confidentiality, integrity, and availability. Attackers could gain full control over the system, leading to data breaches, unauthorized changes to system configurations, and potential disruption of services. Organizations relying on these IBM tools for performance management should treat this vulnerability as a critical risk, especially in environments where local access is possible.

                            2. Potential Attack Scenarios
                            A potential attack scenario involves a malicious insider or an attacker who has gained local access to a system running the affected IBM Performance Tools for i. The attacker could exploit the unqualified library call by crafting a malicious payload and placing it in a location where the library call would execute it. Once executed, the payload would run with elevated privileges, granting the attacker administrative control over the system.

                            The attack process begins with the attacker gaining local access, either through physical access or by exploiting another vulnerability. The attacker then identifies the vulnerable library call and prepares a malicious script or binary. By manipulating the environment or system configuration, the attacker ensures that the malicious code is executed when the library call is invoked. The outcome of this attack could include the installation of persistent backdoors, exfiltration of sensitive data, or disruption of critical services.

                            3. Mitigation Recommendations
                            To mitigate this vulnerability, organizations should immediately apply the patches or updates provided by IBM. The vendor has released advisories detailing the fixes, which can be found at the following links:
                            - IBM Support: https://www.ibm.com/support/pages/node/7154595
                            - IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/284563

                            In addition to patching, organizations should implement the following measures:
                            - Restrict local access to systems running IBM Performance Tools for i to only authorized personnel.
                            - Monitor system logs for unusual activity, particularly privilege escalation attempts.
                            - Conduct regular security audits to identify and address potential vulnerabilities in the environment.
                            - Apply the principle of least privilege to limit the impact of potential exploits.

                            4. Executive Summary
                            CVE-2024-27264 is a high-severity vulnerability in IBM Performance Tools for i versions 7.2 through 7.5, allowing local users to escalate privileges and execute malicious code with administrative rights. This flaw poses a significant risk to organizations, potentially leading to data breaches, system compromise, and operational disruptions.

                            While exploitation requires local access and involves high complexity, the potential impact is severe, affecting confidentiality, integrity, and availability. Organizations must prioritize patching and implement additional security measures to mitigate the risk. Immediate action is recommended to prevent exploitation and safeguard critical systems. Addressing this vulnerability is essential to maintaining the security and reliability of IT infrastructure, ensuring business continuity, and protecting sensitive data.

                            CVE-2024-27275

                            Severity: HIGH

                            Description: IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability caused by an insufficient authority requirement. A local user without administrator privilege can configure a physical file trigger to execute with the privileges of a user socially engineered to access the target file. The correction is to require administrator privilege to configure trigger support.

                            CVSS Score: 7.4

                            Priority

                            B

                            CISA Data

                            EPSS Data

                            • EPSS: 0.000450000
                            • Percentile: 0.159600000
                            • Date: 2025-01-08

                            ExploitDB

                            No data available.

                            HackerOne Data

                            • Rank: 7440
                            • Reports submitted count: 0
                            • Unknown: 0
                            • None: 0
                            • Low: 0
                            • Medium: 0
                            • High: 0
                            • Critical: 0

                            GitHub PoCs

                              Nuclei Templates

                              No data available.

                              VulnCheck Data

                              Affected Products:

                              • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                              References:

                              Risk Assessment

                              1. Risk Assessment
                              The vulnerability identified as CVE-2024-27275 is a local privilege escalation flaw in IBM i versions 7.2, 7.3, 7.4, and 7.5. It arises from insufficient authority requirements, allowing a local user without administrative privileges to configure a physical file trigger. This trigger can execute with the privileges of a user who is socially engineered to access the target file. The CVSS v3.1 base score of 7.4 (HIGH) reflects the significant risk posed by this vulnerability.

                              The nature of this vulnerability is particularly concerning because it enables privilege escalation, which can lead to unauthorized access to sensitive data, system manipulation, and disruption of services. The attack complexity is high, meaning exploitation requires specific conditions and knowledge, but the impact on confidentiality, integrity, and availability is severe. An attacker could gain full control over the affected system, leading to data breaches, system compromise, and potential downtime.

                              The likelihood of exploitation is moderate, given the need for local access and social engineering. However, the potential business impact is high, as successful exploitation could result in significant financial, reputational, and operational damage. Organizations relying on IBM i systems for critical operations should treat this vulnerability as a priority.

                              2. Potential Attack Scenarios
                              A potential attack scenario involves a malicious insider or an attacker who has gained local access to an IBM i system. The attacker identifies a target user with elevated privileges and crafts a social engineering campaign to trick the user into accessing a specific file. Once the user accesses the file, the attacker exploits the vulnerability by configuring a physical file trigger. This trigger executes malicious code with the privileges of the targeted user, granting the attacker administrative control over the system.

                              The attack process begins with the attacker gaining local access to the system, either through compromised credentials or physical access. The attacker then identifies a high-privilege user and uses social engineering tactics, such as phishing or pretexting, to lure the user into accessing a manipulated file. Once the file is accessed, the trigger executes, and the attacker gains elevated privileges. The potential outcomes include unauthorized access to sensitive data, system configuration changes, and disruption of critical services.

                              3. Mitigation Recommendations
                              To mitigate this vulnerability, organizations should immediately apply the relevant patches provided by IBM. The correction requires administrator privileges to configure trigger support, effectively closing the loophole. Administrators should review and update user access controls to minimize the risk of privilege escalation.

                              Additionally, organizations should implement robust social engineering awareness training for employees to reduce the likelihood of successful exploitation. Regular security audits and monitoring of system logs can help detect and respond to suspicious activities.

                              Relevant resources for patching and further information can be found at:
                              - IBM Support: https://www.ibm.com/support/pages/node/7157637
                              - IBM X-Force Vulnerability Details: https://exchange.xforce.ibmcloud.com/vulnerabilities/285203

                              4. Executive Summary
                              CVE-2024-27275 is a high-severity vulnerability affecting IBM i systems versions 7.2 through 7.5. It allows local users to escalate privileges by exploiting insufficient authority requirements, potentially leading to unauthorized access, data breaches, and system compromise. While exploitation requires local access and social engineering, the potential impact on business operations is significant.

                              Organizations should prioritize applying the provided patches and enhancing user access controls to mitigate this risk. Employee training on social engineering awareness is also critical to reduce the likelihood of successful attacks. Addressing this vulnerability promptly is essential to safeguard sensitive data, maintain system integrity, and ensure business continuity.

                              CVE-2024-31870

                              Severity: LOW

                              Description: IBM Db2 for i 7.2, 7.3, 7.4, and 7.5 supplies user defined table function is vulnerable to user enumeration by a local authenticated attacker, without having authority to the related *USRPRF objects. This can be used by a malicious actor to gather information about users that can be targeted in further attacks. IBM X-Force ID: 287174.

                              CVSS Score: 3.3

                              Priority

                              D

                              CISA Data

                              EPSS Data

                              • EPSS: 0.000430000
                              • Percentile: 0.110860000
                              • Date: 2025-01-09

                              ExploitDB

                              No data available.

                              HackerOne Data

                              • Rank: 7450
                              • Reports submitted count: 0
                              • Unknown: 0
                              • None: 0
                              • Low: 0
                              • Medium: 0
                              • High: 0
                              • Critical: 0

                              GitHub PoCs

                                Nuclei Templates

                                No data available.

                                VulnCheck Data

                                Affected Products:

                                • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                                References:

                                Risk Assessment

                                1. Risk Assessment
                                The vulnerability identified as CVE-2024-31870 in IBM Db2 for i versions 7.2, 7.3, 7.4, and 7.5 is classified as a low-severity issue with a CVSS score of 3.3. The vulnerability allows a local authenticated attacker to enumerate users without requiring authority to access related *USRPRF objects. This could enable an attacker to gather information about users, which could be leveraged in further targeted attacks.

                                The nature of the vulnerability is an information disclosure issue, specifically a response discrepancy (CWE-204). The business impact is moderate, as it could facilitate reconnaissance activities for more sophisticated attacks. However, the likelihood of exploitation is low due to the requirement of local authenticated access, which limits the attack surface. The ease of exploitation is also low, as it requires specific conditions and access levels.

                                The primary impact is on confidentiality, as sensitive user information could be exposed. There is no direct impact on integrity or availability, as the vulnerability does not allow for data modification or system disruption.

                                2. Potential Attack Scenarios
                                A potential attack scenario involves a malicious insider or an attacker who has gained local authenticated access to the system. The attacker could exploit the vulnerability by using the user-defined table function to enumerate valid user accounts on the system. This information could then be used to identify high-value targets for further attacks, such as phishing, credential stuffing, or privilege escalation.

                                The attack process would begin with the attacker gaining local access to the system, either through legitimate credentials or by exploiting another vulnerability. Once authenticated, the attacker would execute the vulnerable function to retrieve a list of users. With this information, the attacker could craft targeted attacks against specific users, potentially leading to unauthorized access or data exfiltration.

                                The potential outcomes include compromised user accounts, unauthorized access to sensitive data, and further exploitation of the system. While the immediate impact is limited, the long-term consequences could be significant if the attacker uses the gathered information to launch more damaging attacks.

                                3. Mitigation Recommendations
                                To mitigate this vulnerability, organizations should apply the latest patches and updates provided by IBM. IBM has released advisories addressing this issue, and administrators should follow the guidance provided in the following links:
                                - IBM Support: https://www.ibm.com/support/pages/node/7157638
                                - IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/287174

                                In addition to patching, organizations should implement the principle of least privilege, ensuring that users only have access to the resources necessary for their roles. Regular monitoring and auditing of user activities can also help detect and respond to suspicious behavior.

                                4. Executive Summary
                                CVE-2024-31870 is a low-severity vulnerability in IBM Db2 for i that allows local authenticated attackers to enumerate users. While the immediate risk is limited, the exposure of user information could facilitate more sophisticated attacks. The vulnerability requires local access, reducing the likelihood of widespread exploitation.

                                To address this issue, organizations should apply the latest patches from IBM and enforce strict access controls. Although the direct impact is minimal, the potential for secondary attacks makes it important to mitigate this vulnerability promptly. By taking these steps, organizations can reduce the risk of further exploitation and protect sensitive user information.

                                CVE-2024-31878

                                Severity: MEDIUM

                                Description: IBM i 7.2, 7.3, 7.4, and 7.5 Service Tools Server (SST) is vulnerable to SST user enumeration by a remote attacker. This vulnerability can be used by a malicious actor to gather information about SST users that can be targeted in further attacks. IBM X-Force ID: 287538.

                                CVSS Score: 5.3

                                Priority

                                D

                                CISA Data

                                EPSS Data

                                • EPSS: 0.000460000
                                • Percentile: 0.181340000
                                • Date: 2025-01-09

                                ExploitDB

                                No data available.

                                HackerOne Data

                                • Rank: 7450
                                • Reports submitted count: 0
                                • Unknown: 0
                                • None: 0
                                • Low: 0
                                • Medium: 0
                                • High: 0
                                • Critical: 0

                                GitHub PoCs

                                  Nuclei Templates

                                  No data available.

                                  VulnCheck Data

                                  Affected Products:

                                  • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                                  References:

                                  Risk Assessment

                                  1. Risk Assessment
                                  The vulnerability identified as CVE-2024-31878 affects IBM i versions 7.2, 7.3, 7.4, and 7.5, specifically targeting the Service Tools Server (SST). It allows remote attackers to enumerate SST users, which can lead to information disclosure. The CVSS v3.1 base score of 5.3 (MEDIUM) reflects a moderate risk level. The attack vector is network-based, requiring no user interaction or privileges, making it relatively easy to exploit. The primary impact is on confidentiality, as attackers can gather sensitive information about SST users, which could be used in subsequent targeted attacks. While there is no direct impact on integrity or availability, the exposure of user information increases the risk of follow-on attacks, such as credential stuffing or social engineering. The EPSS score of 0.000460000 indicates a low likelihood of exploitation in the wild, but the potential for misuse remains significant due to the ease of exploitation and the sensitive nature of the exposed data.

                                  2. Potential Attack Scenarios
                                  A potential attack scenario involves a remote attacker leveraging this vulnerability to enumerate SST users on an exposed IBM i system. The attacker would first scan the network for vulnerable IBM i systems with SST enabled. Once identified, the attacker would use automated tools or scripts to send crafted requests to the SST server, exploiting the vulnerability to retrieve a list of valid SST users. With this information, the attacker could then target these users with phishing campaigns, brute-force attacks, or other credential-based exploits. For example, if an SST user has reused credentials across systems, the attacker could gain unauthorized access to other critical systems. The outcome could range from unauthorized access to sensitive data to full system compromise, depending on the attacker's objectives and the security posture of the targeted organization.

                                  3. Mitigation Recommendations
                                  To mitigate this vulnerability, organizations should immediately apply the relevant patches or updates provided by IBM. IBM has published an advisory with detailed instructions, available at https://www.ibm.com/support/pages/node/7156725. Additionally, organizations should restrict network access to the SST server, ensuring it is not exposed to untrusted networks. Implementing network segmentation and firewall rules can help limit exposure. Regularly monitoring and auditing SST user accounts for suspicious activity is also recommended. If SST functionality is not required, consider disabling it entirely to reduce the attack surface. For further guidance, refer to IBM's X-Force Exchange entry at https://exchange.xforce.ibmcloud.com/vulnerabilities/287538.

                                  4. Executive Summary
                                  CVE-2024-31878 is a medium-severity vulnerability affecting IBM i systems versions 7.2 through 7.5. It allows remote attackers to enumerate SST users, potentially exposing sensitive information that could be used in further attacks. While the likelihood of exploitation is currently low, the ease of exploitation and the potential for significant business impact make this a critical issue to address. The primary risk is to confidentiality, as attackers could use the exposed information to launch targeted attacks. Immediate action is recommended, including applying patches, restricting network access to SST servers, and monitoring for suspicious activity. Addressing this vulnerability is essential to protect sensitive data and maintain the integrity of your systems.

                                  CVE-2024-35122

                                  Severity: LOW

                                  Description: IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file.

                                  CVSS Score: 2.8

                                  Priority

                                  D

                                  CISA Data

                                  EPSS Data

                                  • EPSS: 0.000250000
                                  • Percentile: 0.069350000
                                  • Date: 2026-04-29

                                  ExploitDB

                                  No data available.

                                  HackerOne Data

                                  • Rank: 9224
                                  • Reports submitted count: 0
                                  • Unknown: 0
                                  • None: 0
                                  • Low: 0
                                  • Medium: 0
                                  • High: 0
                                  • Critical: 0

                                  GitHub PoCs

                                    Nuclei Templates

                                    No data available.

                                    VulnCheck Data

                                    Affected Products:

                                    • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                                    References:

                                    Risk Assessment

                                    1. Risk Assessment
                                    The vulnerability, CVE-2024-35122, represents a low-severity local denial of service condition in IBM i versions 7.2, 7.3, 7.4, and 7.5. The core issue is an insufficient authority requirement when configuring referential constraints, allowing a local, non-privileged user to trigger a DoS. The vulnerability’s business impact is moderate; while not catastrophic, it can disrupt operations for users affected by the DoS, potentially impacting productivity and service availability. The likelihood of exploitation is moderate, as it requires social engineering to obtain privileges from a user who can access the target file, but doesn’t require complex technical skills. Ease of exploitation is also moderate, requiring a locally authenticated user with some familiarity with IBM i configuration. The vulnerability primarily impacts availability, causing a denial of service at the file level. Confidentiality and integrity are not directly impacted, though a prolonged DoS could indirectly affect data integrity if processes are interrupted mid-write. The EPSS score of 0.000250000 suggests a relatively low probability of exploitation in the wild.

                                    2. Potential Attack Scenarios
                                    A potential attack scenario involves a disgruntled or socially engineered IBM i user. An attacker could socially engineer a user with sufficient privileges to configure referential constraints on a target file. The attacker, a local non-privileged user, then leverages those privileges (obtained through the social engineering) to configure the constraint in a way that causes a localized denial of service when accessing the file. This could manifest as slowed performance or outright inability to access the target file for other users. The attack vector is local, requiring access to the IBM i system. The attack process involves gaining the privileges through social engineering, then configuring the referential constraint. The potential outcome is a denial of service impacting the target file's availability, potentially disrupting applications or processes relying on that file.

                                    3. Mitigation Recommendations
                                    The primary mitigation is to apply the patch provided by IBM. Refer to IBM support page https://www.ibm.com/support/pages/node/7178317 for the latest patch and installation instructions. In the interim, review and restrict the privileges granted to users who can configure referential constraints. Implement least privilege principles, ensuring users only have the necessary permissions to perform their tasks. Consider monitoring for unusual referential constraint configurations. Educate users on potential social engineering tactics to minimize the likelihood of privilege escalation. Regularly audit user permissions and access controls.

                                    4. Executive Summary
                                    IBM i versions 7.2 through 7.5 are susceptible to a localized denial of service vulnerability (CVE-2024-35122). A local user, with some assistance via social engineering, can cause a disruption in service at the file level. While the vulnerability is considered low-severity, a denial of service can impact user productivity and potentially disrupt critical business processes. We recommend applying the patch from IBM as soon as possible to mitigate this risk. In the meantime, review user privileges and educate users on social engineering threats. Prompt action will ensure continued availability of IBM i resources and minimize potential disruption to business operations.

                                    CVE-2024-55898

                                    Severity: HIGH

                                    Description: IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege.

                                    CVSS Score: 8.5

                                    Affected Products:

                                    • IBM i - Versions: 7.2, 7.3, 7.4, 7.5

                                    References: