Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands

IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands

Posted on November 18, 2025November 18, 2025 By CWS

IBM has launched important safety updates addressing two extreme vulnerabilities in its AIX working system that would enable distant attackers to execute arbitrary instructions on affected programs.

Each vulnerabilities stem from improper course of controls in important IBM AIX companies.

Vital Flaws in IBM AIX Providers

The primary vulnerability, CVE-2025-36251, impacts the Nimsh service and its SSL/TLS implementations. This important flaw might allow distant attackers to bypass safety controls and execute unauthorized instructions.

The vulnerability carries a CVSS base rating of 9.6, indicating extreme threat throughout network-accessible programs. The assault requires community entry however no authentication or person interplay, making it notably harmful for uncovered programs.

The second vulnerability, CVE-2025-36250, impacts the NIM server service (nimesis), previously referred to as NIM grasp. This flaw is much more important, receiving an ideal CVSS rating of 10.0.

CVE IDCVE-2025-36251CVE-2025-36250Affected ServiceIBM AIX nimsh serviceIBM AIX NIM server (nimesis)Vulnerability TypeSSL/TLS implementation flawImproper course of controlsCWE ClassificationCWE-114: Course of ControlCWE-114: Course of ControlCVSS Base Score9.610.0Attack Vector (AV)NetworkNetwork

Like the primary vulnerability, it stems from improper course of controls that fail to correctly prohibit command execution.

Attackers can exploit this remotely with out requiring authentication or person interplay, probably compromising the whole infrastructure.

Each vulnerabilities signify extra assault vectors for points beforehand addressed in CVE-2024-56347 and CVE-2024-56346.

This means that IBM’s earlier patches might not have comprehensively eradicated all exploitation paths, necessitating these extra safety updates.

The vulnerabilities are labeled below CWE-114: Course of Management, a weak spot class specializing in improper administration of processes and their permissions.

Exploitation might lead to full system compromise, together with unauthorized knowledge entry, modification, and denial-of-service assaults.

IBM AIX directors ought to prioritize patching these vulnerabilities instantly. The NIM companies are important parts used for managing and deploying IBM AIX programs throughout enterprise environments.

Exploitation might enable attackers to realize management over a number of programs concurrently. Organizations working IBM AIX ought to evaluation their present patch ranges and apply the most recent safety updates from IBM.

Moreover, implementing community segmentation and proscribing entry to NIM and nimsh companies to trusted networks can present non permanent mitigation.

Safety groups ought to search for uncommon exercise and use instruments to detect assaults. These vulnerabilities underscore the significance of sustaining present patch ranges on important infrastructure parts.

Organizations depending on IBM AIX ought to set up common safety replace procedures and carefully monitor IBM safety advisories for rising threats.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AIX, Arbitrary, Attacker, Commands, Execute, IBM, Remote, Vulnerabilities

Post navigation

Previous Post: Chrome Type Confusion Zero-Day Vulnerability Actively Exploited in the Wild
Next Post: Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Related Posts

New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data Cyber Security News
GitGuardian Ends 2025 with Strong Enterprise Momentum GitGuardian Ends 2025 with Strong Enterprise Momentum Cyber Security News
Internet Archive Abused for Hosting Stealthy JScript Loader Malware Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates Cyber Security News
Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News