Cyber Posture

CVE-2025-36250

Critical

Published: 13 November 2025

Published
13 November 2025
Modified
19 November 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0010 26.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-36250 is a critical vulnerability affecting the NIM server service, known as nimesis, in IBM AIX 7.2 and 7.3, as well as IBM VIOS 3.1 and 4.1. The flaw stems from improper process controls (CWE-114), enabling a remote attacker to execute arbitrary commands. This CVE addresses additional attack vectors related to a previously patched issue in CVE-2024-56346, with a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation grants arbitrary command execution on the affected NIM server (formerly NIM master), potentially leading to complete compromise of confidentiality, integrity, and availability due to the changed scope.

IBM has issued an advisory with details on the vulnerability and available patches at https://www.ibm.com/support/pages/node/7251173. Security practitioners should consult this page for mitigation guidance, including applying the recommended updates to affected AIX and VIOS systems.

Details

CWE(s)
CWE-114

Affected Products

ibm
vios
3.1.0, 4.1.0
ibm
aix
7.2, 7.3

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote arbitrary command execution vulnerability in the NIM server service directly enables Exploitation of Remote Services (T1210) and facilitates Unix Shell (T1059.004) command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References