CVE-2025-33112

| EUVD-2025-17693 HIGH
2025-06-10 [email protected]
8.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17693
CVE Published
Jun 10, 2025 - 17:23 nvd
HIGH 8.4

Description

IBM AIX 7.3 and IBM VIOS 4.1.1 Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary code due to improper neutralization of pathname input.

Analysis

Local privilege escalation vulnerability in IBM AIX 7.3 and IBM VIOS 4.1.1's Perl implementation that allows non-privileged local users to execute arbitrary code through improper pathname neutralization (path traversal). With a CVSS score of 8.4 and no authentication requirement, this represents a critical risk for AIX environments where local user access exists. The vulnerability's active exploitation status and proof-of-concept availability would significantly elevate real-world risk.

Technical Context

The vulnerability exists in the Perl implementation bundled with IBM AIX and VIOS, specifically in how pathname inputs are processed. CWE-23 (Relative Path Traversal) indicates the root cause involves improper neutralization of special path elements (such as '..' or symbolic links) in user-supplied pathname input. The Perl interpreter fails to adequately sanitize or validate file paths before using them in operations, allowing attackers to traverse directory boundaries and access or execute files outside intended directories. Affected CPE strings include cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:* and cpe:2.3:o:ibm:vios:4.1.1:*:*:*:*:*:*:*. This is particularly dangerous because Perl is commonly used for system administration scripts and utilities that may run with elevated privileges or in sensitive contexts.

Affected Products

- vendor: IBM; product: AIX; versions: ['7.3']; components: ['Perl implementation']; cpe: cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:* - vendor: IBM; product: VIOS (Virtual I/O Server); versions: ['4.1.1']; components: ['Perl implementation']; cpe: cpe:2.3:o:ibm:vios:4.1.1:*:*:*:*:*:*:*

Remediation

IBM should release security patches for AIX 7.3 and VIOS 4.1.1 addressing improper pathname neutralization in Perl. Pending patch availability: (1) Check IBM Security Advisories portal for CVE-2025-33112 patches and apply immediately to all affected systems; (2) If patches are unavailable, restrict local user access to affected AIX systems through access controls and privilege separation; (3) Review Perl scripts and applications for hardcoded path assumptions and implement input validation for any user-supplied pathname parameters; (4) Monitor AIX audit logs for suspicious file access patterns or Perl script executions; (5) Consider implementing Security Enhanced Linux (SELinux) or AIX's native mandatory access controls (MAC) to limit damage from arbitrary code execution; (6) Segment network architecture to isolate AIX systems and limit lateral movement if a local compromise occurs. Contact IBM support for vendor-specific patch timelines and advisories.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +42
POC: 0

Share

CVE-2025-33112 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy