CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system.
Analysis
Privilege escalation vulnerability in IBM Backup, Recovery and Media Services (BRMS) for i versions 7.4 and 7.5 that exploits unqualified library calls in compiled or restored programs. An authenticated user with compile or restore capabilities can inject malicious code that executes with elevated component access to the IBM i operating system, achieving full system compromise. This is a high-severity issue affecting enterprise backup infrastructure, though it requires valid credentials and medium attack complexity to exploit.
Technical Context
The vulnerability stems from CWE-250 (Execution with Unnecessary Privileges) combined with unsafe library resolution patterns on IBM i systems. BRMS programs make unqualified procedure calls—meaning they don't explicitly specify which library contains the target procedure—allowing the library search path to be manipulated. An attacker with compile or restore privileges can create a malicious program object in a library earlier in the search sequence, causing the BRMS component to execute attacker-controlled code with the elevated privileges of the BRMS subsystem. This is particularly dangerous on IBM i (iSeries/AS400) where the object-based security model and library search mechanisms can be exploited if not properly qualified. The affected CPE scope is cpe:2.7.a:ibm:backup_recovery_and_media_services_for_i:7.4 and cpe:2.7.a:ibm:backup_recovery_and_media_services_for_i:7.5, indicating the vulnerability is isolated to these specific major versions.
Affected Products
Backup, Recovery and Media Services for i (['7.4', '7.5'])
Remediation
Patching: Apply IBM security patch for BRMS when released. Monitor IBM Security Advisories for CVE-2025-33108 patch updates. Expected to be released via IBM iSeries system patches or BRMS-specific fixpaks.; priority: Critical Access Control Mitigation: Restrict compile and restore program privileges to only trusted, security-cleared personnel. Review and audit all users with *USE authority to BRMS objects and compile/restore capabilities. Implement principle of least privilege for BRMS subsystem jobs.; priority: High Library Search Path Hardening: Review BRMS job descriptions and library lists (LIBL) to ensure no user-writable libraries appear before system/IBM libraries in the search sequence. Use qualified procedure calls where possible in custom integrations with BRMS.; priority: High Monitoring: Enable IBM i Security Auditing for BRMS-related objects, particularly object creation and program execution events. Monitor for unusual program object creation in libraries ahead of BRMS library path.; priority: Medium Workaround: If patching is delayed, consider restricting BRMS feature access to only essential personnel and reducing the scope of compile/restore permissions granted to end users until patch is available.; priority: Medium
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18318