CVE-2025-36251

Published Nov 13, 2025

Last updated 3 months ago

Overview

Description
IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 nimsh service SSL/TLS implementations could allow a remote attacker to execute arbitrary commands due to improper process controls. This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56347.
Source
psirt@us.ibm.com
NVD status
Analyzed
Products
vios, aix

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

psirt@us.ibm.com
CWE-114

Social media

Hype score
Not currently trending
  1. ⚠️Vulnerabilidades en productos IBM ❗CVE-2025-36250 ❗CVE-2025-36251 ➡️Más info: https://t.co/YBpUaF2rGE https://t.co/im5xnFoFII

    @CERTpy

    28 Nov 2025

    98 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🔴 #IBM AIX, Command Injection, #CVE-2025-36251 (Critical) https://t.co/0eCsu5PE3s

    @dailycve

    20 Nov 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Use CVE-2025-36236 to drop a malicious payload in a system directory. Use CVE-2025-36250 to execute it remotely without authentication. Use CVE-2025-36251 to hijack secure connections. Use CVE-2025-36096 to steal private keys and pivot to every other AIX server on the network

    @marc_vanlommel

    19 Nov 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. IBM AIXのNIM関連に複数の深刻な脆弱性(CVE-2025-36250,CVE-2025-36096,CVE-2025-36251) https://t.co/dFy0d6XtG5 #セキュリティ対策Lab #セキュリティ #Security

    @securityLab_jp

    19 Nov 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨Alert🚨:AIX is vulnerable to arbitrary command execution (CVE-2025-36251,CVE-2025-36250), insufficiently protected credentials (CVE-2025-36096), and path traversal (CVE-2025-36236). -------------------- CVE-2025-36250 (CVSS 10.0) : Remote Command Execution via nimesis https

    @HunterMapping

    17 Nov 2025

    3133 Impressions

    10 Retweets

    29 Likes

    16 Bookmarks

    1 Reply

    0 Quotes

  6. 🚨🚨Critical Vulnerabilities in IBM CVE-2025-36250 (CVSS 10.0): RCE via nimesis CVE-2025-36251 (CVSS 9.6): RCE via nimsh CVE-2025-36096 (CVSS 9.0): Exposure of NIM Private Keys ZoomEye Dork👉app="IBM AIX" Over 7.4m exposed IBM AIX instances. ZoomEye Link: https://t.co/S5N

    @zoomeye_team

    17 Nov 2025

    6881 Impressions

    22 Retweets

    56 Likes

    16 Bookmarks

    2 Replies

    1 Quote

  7. Security Bulletin: AIX is vulnerable to arbitrary command execution (CVE-2025-36251, CVE-2025-36250), insufficiently protected credentials (CVE-2025-36096), and path traversal (CVE-2025-36236) https://t.co/XHQ3xFncik 『(直訳)AIX

    @taku888infinity

    17 Nov 2025

    1031 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. IBM AIX CVE-2025-36251: CVSS 9.6 RCE via nimsh service SSL/TLS implementation. Additional attack vectors for previously patched CVE-2024-56347. Three IBM AIX CVEs this week suggest broader NIM infrastructure review needed. https://t.co/ECBOgnSMLY

    @gothburz

    15 Nov 2025

    162 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. CVE-2025-36251 IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 nimsh service SSL/TLS implementations could allow a remote attacker to execute arbitrary commands due to improper proce… https://t.co/4TQFemChhs

    @CVEnew

    14 Nov 2025

    264 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. [CVE-2025-36251: CRITICAL] Vulnerability alert: IBM AIX 7.2/7.3 & VIOS 3.1/4.1 nimsh service SSL/TLS flaws allow remote attackers to run arbitrary commands. Patch available for CVE-2024-56347.#cve,CVE-2025-36251,#cybersecurity https://t.co/DUZNFPqOE3 https://t.co/z71IPRFMrI

    @CveFindCom

    13 Nov 2025

    59 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.