IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-23989 IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator.
Fixes

Solution

The issue can be fixed by applying a PTF to IBM i. IBM i 7.6, 7.5, 7.4, and 7.3 are addressed. The IBM i PTF number for 5770-SS1 Option 34 contains the fix for the vulnerability. IBM i Release 5770-SS1 7.6 SJ06558 https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06558 7.5 SJ06557 https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06557 7.4 SJ06552 https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06552 7.3 SJ06550 https://www.ibm.com/support/fixcentral Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.


Workaround

No workaround given by the vendor.

History

Fri, 15 Aug 2025 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*
cpe:2.3:o:ibm:i:7.5:*:*:*:*:*:*:*
cpe:2.3:o:ibm:i:7.6:*:*:*:*:*:*:*

Fri, 08 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 Aug 2025 14:30:00 +0000

Type Values Removed Values Added
Description IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator.
Title IBM i authentication bypass
First Time appeared Ibm
Ibm i
Weaknesses CWE-290
CPEs cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm i
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2025-08-13T15:03:46.275Z

Reserved: 2025-04-15T21:16:17.124Z

Link: CVE-2025-36119

cve-icon Vulnrichment

Updated: 2025-08-08T14:44:03.890Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-08T15:15:28.247

Modified: 2025-08-15T18:15:27.227

Link: CVE-2025-36119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.