{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-33109","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2025-04-15T17:50:49.744Z","datePublished":"2025-07-24T15:06:49.888Z","dateUpdated":"2026-02-26T17:50:15.484Z"},"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"i","vendor":"IBM","versions":[{"status":"affected","version":"7.2, 7.3, 7.4, 7.5, 7.6"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid database authority check.  A bad actor could execute a database procedure or function without having all required permissions, in addition to causing denial of service for some database actions."}],"value":"IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid database authority check.  A bad actor could execute a database procedure or function without having all required permissions, in addition to causing denial of service for some database actions."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-250","description":"CWE-250 Execution with Unnecessary Privileges","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2025-08-18T01:28:18.727Z"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.ibm.com/support/pages/node/7240410"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The issue can be addressed by applying PTFs to IBM i.  IBM i releases 7.6, 7.5, 7.4, 7.3. and 7.2 will be addressed.<br>The IBM i 5770-SS1 PTF numbers listed below resolve the vulnerability.<br><br>\n\n<table><tbody><tr><td>7.6</td><td><p>SJ05809<br>SJ05810<br>SJ05837<br>SJ05960<br>SJ06021<br>SJ06219</p></td><td><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05809\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05809</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05810\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05810</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05837\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05837</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05960\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05960</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06021\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06021</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06219\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06219</a></p></td></tr><tr><td>7.5</td><td><p>SJ05838<br>SJ05847<br>SJ05850<br>SJ05851<br>SJ05953<br>SJ06022</p></td><td><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05838\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05838</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05847\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05847</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05850\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05850</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05851\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05851</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05953\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05953</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06022\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06022</a></p></td></tr><tr><td>7.4</td><td><p>SJ05839<br>SJ05846<br>SJ05852<br>SJ05853<br>SJ05959<br>SJ06023</p></td><td><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05839\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05839</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05846\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05846</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05852\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05852</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05853\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05853</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05959\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05959</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06023\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06023</a></p></td></tr><tr><td>7.3</td><td><p>SJ05840<br>SJ05845<br>SJ05854<br>SJ05855<br>SJ05966<br>SJ06477</p></td><td><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05840\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05840</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05845\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05845</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05854\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05854</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05855\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05855</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05966\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05966</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06477\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06477</a></p></td></tr><tr><td>7.2</td><td><p>SJ05842<br>SJ05844<br>SJ05856<br>SJ05857<br>SJ05965<br>SJ06478</p></td><td><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05842\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05842</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05844\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05844</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05856\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05856</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05857\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05857</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05965\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05965</a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06478\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06478</a></p></td></tr></tbody></table>\n\n<br>"}],"value":"The issue can be addressed by applying PTFs to IBM i.  IBM i releases 7.6, 7.5, 7.4, 7.3. and 7.2 will be addressed.\nThe IBM i 5770-SS1 PTF numbers listed below resolve the vulnerability.\n\n\n\n7.6SJ05809\nSJ05810\nSJ05837\nSJ05960\nSJ06021\nSJ06219\n\n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05809 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05810 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05837 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05960 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06021 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06219 \n\n7.5SJ05838\nSJ05847\nSJ05850\nSJ05851\nSJ05953\nSJ06022\n\n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05838 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05847 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05850 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05851 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05953 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06022 \n\n7.4SJ05839\nSJ05846\nSJ05852\nSJ05853\nSJ05959\nSJ06023\n\n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05839 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05846 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05852 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05853 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05959 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06023 \n\n7.3SJ05840\nSJ05845\nSJ05854\nSJ05855\nSJ05966\nSJ06477\n\n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05840 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05845 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05854 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05855 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05966 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06477 \n\n7.2SJ05842\nSJ05844\nSJ05856\nSJ05857\nSJ05965\nSJ06478\n\n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05842 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05844 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05856 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05857 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ05965 \n https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06478"}],"source":{"discovery":"UNKNOWN"},"title":"IBM i privilege escalation","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-33109","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-07-25T03:55:30.375101Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:50:15.484Z"}}]}}