- Description
- IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyaddr function.
- Source
- psirt@us.ibm.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
🔴 #IBM CICS TX, Arbitrary Code Execution, #CVE-2025-1329 (Critical) https://t.co/i2sa5rRyJH
@dailycve
5 Jun 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-1329 🔴 HIGH (7.8) 🏢 IBM - CICS TX Standard 🏗️ 11.1 🔗 https://t.co/7vNgJSeAHW 🔗 https://t.co/n0Zqd3hmmp #CyberCron #VulnAlert #InfoSec https://t.co/KwiQxTOFZ7
@cybercronai
9 May 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2E54DF77-511D-4C8A-88B0-3ABB4E232273"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "02FE1FD1-BEB7-485B-8C4F-69BB0B364800"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_10:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1EBA5FE4-2B16-4D6E-A52E-5614110E45C7"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_11:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3FB7C53F-5384-4042-ABBE-AA255D96D387"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_12:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6196BF21-4784-4847-AEED-0B5F3749A07D"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_13:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1F0D1169-6A66-4588-9BB7-B3898BF6306A"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_14:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7E7D1F83-B8B4-4710-A824-82FEE0DD7B80"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_15:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F4353747-B2A2-44CF-BD15-A0FC108C71A0"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_16:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D1ACC485-4989-4ADC-9923-35908C4E63D0"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_17:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F410DA77-7FB6-47F4-97A7-AF3D725AF694"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_18:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0147202F-5060-4B63-9914-9C18834E7F08"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_19:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ACA1A661-525E-4BA0-8AEC-C8DB13F56289"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "630F214B-71DD-426B-94A7-656F300B51D2"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_20:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "92756083-B2B5-471A-B15D-F6DD13F5E7AB"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_21:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B2962EF0-F3B6-4ED6-93C0-802905B8BB4E"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_22:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "63D2829D-7115-48DB-9365-9A2FF0138F32"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_23:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D3A879A0-BAE4-4715-8C0D-80F03106536C"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_24:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C8FB5E7-BF3F-44AE-890E-0E67D4EF6605"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6164818E-D76D-4B89-B97A-837D204B765A"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B15AA178-3D88-42AD-8714-67B53900766C"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_5:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4096B83E-4FE3-44EE-AD25-F3C3CA8FD5B2"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_6:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "01459EE9-70B4-4009-97A5-6CF02D846BA2"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_7:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4B79D8FE-7F05-44D0-AF61-1A66459FC154"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_8:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "30520211-E2D2-4885-B4D3-ACF92523BC1A"
},
{
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_9:*:*:standard:*:*:*",
"vulnerable": true,
"matchCriteriaId": "67835C0E-A8A6-40CE-801F-79AC3E61E854"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]