Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability by following the instructions in the fixes and remediation section of the IBM security bulletin: https://www.ibm.com/support/pages/node/7251173
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7251173 |
|
Wed, 19 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ibm:vios:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1.0:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 nimsh service SSL/TLS implementations could allow a remote attacker to execute arbitrary commands due to improper process controls. This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56347. | |
| Title | AIX Command Execution | |
| First Time appeared |
Ibm
Ibm aix Ibm vios |
|
| Weaknesses | CWE-114 | |
| CPEs | cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:vios:4.1:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm aix Ibm vios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-02-26T16:56:59.416Z
Reserved: 2025-04-15T21:16:44.886Z
Link: CVE-2025-36251
Updated: 2025-11-14T15:39:15.673Z
Status : Analyzed
Published: 2025-11-13T22:15:51.053
Modified: 2025-11-19T22:08:07.717
Link: CVE-2025-36251
No data.
OpenCVE Enrichment
No data.