Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands

Posted on November 18, 2025November 18, 2025 By CWS

IBM has launched important safety updates addressing two extreme vulnerabilities in its AIX working system that would enable distant attackers to execute arbitrary instructions on affected programs.

Each vulnerabilities stem from improper course of controls in important IBM AIX companies.

Vital Flaws in IBM AIX Providers

The primary vulnerability, CVE-2025-36251, impacts the Nimsh service and its SSL/TLS implementations. This important flaw might allow distant attackers to bypass safety controls and execute unauthorized instructions.

The vulnerability carries a CVSS base rating of 9.6, indicating extreme threat throughout network-accessible programs. The assault requires community entry however no authentication or person interplay, making it notably harmful for uncovered programs.

The second vulnerability, CVE-2025-36250, impacts the NIM server service (nimesis), previously referred to as NIM grasp. This flaw is much more important, receiving an ideal CVSS rating of 10.0.

CVE IDCVE-2025-36251CVE-2025-36250Affected ServiceIBM AIX nimsh serviceIBM AIX NIM server (nimesis)Vulnerability TypeSSL/TLS implementation flawImproper course of controlsCWE ClassificationCWE-114: Course of ControlCWE-114: Course of ControlCVSS Base Score9.610.0Attack Vector (AV)NetworkNetwork

Like the primary vulnerability, it stems from improper course of controls that fail to correctly prohibit command execution.

Attackers can exploit this remotely with out requiring authentication or person interplay, probably compromising the whole infrastructure.

Each vulnerabilities signify extra assault vectors for points beforehand addressed in CVE-2024-56347 and CVE-2024-56346.

This means that IBM’s earlier patches might not have comprehensively eradicated all exploitation paths, necessitating these extra safety updates.

The vulnerabilities are labeled below CWE-114: Course of Management, a weak spot class specializing in improper administration of processes and their permissions.

Exploitation might lead to full system compromise, together with unauthorized knowledge entry, modification, and denial-of-service assaults.

IBM AIX directors ought to prioritize patching these vulnerabilities instantly. The NIM companies are important parts used for managing and deploying IBM AIX programs throughout enterprise environments.

Exploitation might enable attackers to realize management over a number of programs concurrently. Organizations working IBM AIX ought to evaluation their present patch ranges and apply the most recent safety updates from IBM.

Moreover, implementing community segmentation and proscribing entry to NIM and nimsh companies to trusted networks can present non permanent mitigation.

Safety groups ought to search for uncommon exercise and use instruments to detect assaults. These vulnerabilities underscore the significance of sustaining present patch ranges on important infrastructure parts.

Organizations depending on IBM AIX ought to set up common safety replace procedures and carefully monitor IBM safety advisories for rising threats.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AIX, Arbitrary, Attacker, Commands, Execute, IBM, Remote, Vulnerabilities

Post navigation

Previous Post: Chrome Type Confusion Zero-Day Vulnerability Actively Exploited in the Wild
Next Post: Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Related Posts

New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft to Cancel Plans Imposing Daily Limit For Exchange Online Bulk E-mails
  • Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
  • Chinese Hackers Actively Attacking Taiwan Critical Infrastructure
  • Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft to Cancel Plans Imposing Daily Limit For Exchange Online Bulk E-mails
  • Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
  • Chinese Hackers Actively Attacking Taiwan Critical Infrastructure
  • Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark