Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands

Posted on November 18, 2025November 18, 2025 By CWS

IBM has launched important safety updates addressing two extreme vulnerabilities in its AIX working system that would enable distant attackers to execute arbitrary instructions on affected programs.

Each vulnerabilities stem from improper course of controls in important IBM AIX companies.

Vital Flaws in IBM AIX Providers

The primary vulnerability, CVE-2025-36251, impacts the Nimsh service and its SSL/TLS implementations. This important flaw might allow distant attackers to bypass safety controls and execute unauthorized instructions.

The vulnerability carries a CVSS base rating of 9.6, indicating extreme threat throughout network-accessible programs. The assault requires community entry however no authentication or person interplay, making it notably harmful for uncovered programs.

The second vulnerability, CVE-2025-36250, impacts the NIM server service (nimesis), previously referred to as NIM grasp. This flaw is much more important, receiving an ideal CVSS rating of 10.0.

CVE IDCVE-2025-36251CVE-2025-36250Affected ServiceIBM AIX nimsh serviceIBM AIX NIM server (nimesis)Vulnerability TypeSSL/TLS implementation flawImproper course of controlsCWE ClassificationCWE-114: Course of ControlCWE-114: Course of ControlCVSS Base Score9.610.0Attack Vector (AV)NetworkNetwork

Like the primary vulnerability, it stems from improper course of controls that fail to correctly prohibit command execution.

Attackers can exploit this remotely with out requiring authentication or person interplay, probably compromising the whole infrastructure.

Each vulnerabilities signify extra assault vectors for points beforehand addressed in CVE-2024-56347 and CVE-2024-56346.

This means that IBM’s earlier patches might not have comprehensively eradicated all exploitation paths, necessitating these extra safety updates.

The vulnerabilities are labeled below CWE-114: Course of Management, a weak spot class specializing in improper administration of processes and their permissions.

Exploitation might lead to full system compromise, together with unauthorized knowledge entry, modification, and denial-of-service assaults.

IBM AIX directors ought to prioritize patching these vulnerabilities instantly. The NIM companies are important parts used for managing and deploying IBM AIX programs throughout enterprise environments.

Exploitation might enable attackers to realize management over a number of programs concurrently. Organizations working IBM AIX ought to evaluation their present patch ranges and apply the most recent safety updates from IBM.

Moreover, implementing community segmentation and proscribing entry to NIM and nimsh companies to trusted networks can present non permanent mitigation.

Safety groups ought to search for uncommon exercise and use instruments to detect assaults. These vulnerabilities underscore the significance of sustaining present patch ranges on important infrastructure parts.

Organizations depending on IBM AIX ought to set up common safety replace procedures and carefully monitor IBM safety advisories for rising threats.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AIX, Arbitrary, Attacker, Commands, Execute, IBM, Remote, Vulnerabilities

Post navigation

Previous Post: Chrome Type Confusion Zero-Day Vulnerability Actively Exploited in the Wild
Next Post: Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Related Posts

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps Cyber Security News
YouTube Down for Users Globally – Google Confirms Outage Cyber Security News
GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News
APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News