Description
IBM i 7.6
contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. A malicious actor can use the command to elevate privileges to gain root access to the host operating system.
contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. A malicious actor can use the command to elevate privileges to gain root access to the host operating system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11553 | IBM i 7.6 contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. A malicious actor can use the command to elevate privileges to gain root access to the host operating system. |
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7231025 |
|
History
Thu, 17 Jul 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:* |
Thu, 17 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM i 7.6 contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. A malicious actor can use the command to elevate privileges to gain root access to the host operating system. | |
| Title | IBM i privilege escalation | |
| First Time appeared |
Ibm
Ibm i |
|
| Weaknesses | CWE-278 | |
| CPEs | cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Ibm
Ibm i |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-02-26T18:28:10.513Z
Reserved: 2025-03-29T13:27:47.251Z
Link: CVE-2025-2947
Updated: 2025-04-17T17:55:05.403Z
Status : Analyzed
Published: 2025-04-17T17:15:33.490
Modified: 2025-07-17T18:37:40.007
Link: CVE-2025-2947
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD