Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability by following the instructions in the fixes and remediation section of the IBM security bulletin: https://www.ibm.com/support/pages/node/7251173
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7251173 |
|
Wed, 19 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ibm:vios:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1.0:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request to write arbitrary files on the system. | |
| Title | AIX Path Traversal | |
| First Time appeared |
Ibm
Ibm aix Ibm vios |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm aix Ibm vios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-11-14T15:25:04.199Z
Reserved: 2025-04-15T21:16:42.824Z
Link: CVE-2025-36236
Updated: 2025-11-14T15:24:59.846Z
Status : Analyzed
Published: 2025-11-13T22:15:50.700
Modified: 2025-11-19T22:11:10.987
Link: CVE-2025-36236
No data.
OpenCVE Enrichment
No data.