Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability by following the instructions in the fixes and remediation section of the IBM security bulletin: https://www.ibm.com/support/pages/node/7251173
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7251173 |
|
Wed, 19 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ibm:vios:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1.0:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to execute arbitrary commands due to improper process controls. This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56346. | |
| Title | AIX Code Execution | |
| First Time appeared |
Ibm
Ibm aix Ibm vios |
|
| Weaknesses | CWE-114 | |
| CPEs | cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm aix Ibm vios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-02-26T16:56:58.500Z
Reserved: 2025-04-15T21:16:44.886Z
Link: CVE-2025-36250
Updated: 2025-11-14T15:26:47.948Z
Status : Analyzed
Published: 2025-11-13T22:15:50.887
Modified: 2025-11-19T22:08:58.157
Link: CVE-2025-36250
No data.
OpenCVE Enrichment
No data.