{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-36119","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2025-04-15T21:16:17.124Z","datePublished":"2025-08-08T14:25:40.141Z","dateUpdated":"2026-02-26T17:49:46.611Z"},"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*","cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"i","vendor":"IBM","versions":[{"status":"affected","version":"7.3"},{"status":"affected","version":"7.4"},{"status":"affected","version":"7.5"},{"status":"affected","version":"7.6"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator."}],"value":"IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-290","description":"CWE-290 Authentication Bypass by Spoofing","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2025-08-08T14:25:40.141Z"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.ibm.com/support/pages/node/7241008"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The issue can be fixed by applying a PTF to IBM i.  IBM i 7.6, 7.5, 7.4, and 7.3 are addressed.<br>The IBM i PTF number for 5770-SS1 Option 34 contains the fix for the vulnerability.<br> <br>IBM i Release  5770-SS1<br>7.6 SJ06558  <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06558\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06558</a><br>7.5&nbsp;SJ06557  <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06557\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06557</a><br>7.4&nbsp;SJ06552  <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06552\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06552</a><br>7.3 SJ06550  <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06550\">https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06550<br></a><br><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/fixcentral\">https://www.ibm.com/support/fixcentral</a><br><br>Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.<br>"}],"value":"The issue can be fixed by applying a PTF to IBM i.  IBM i 7.6, 7.5, 7.4, and 7.3 are addressed.\nThe IBM i PTF number for 5770-SS1 Option 34 contains the fix for the vulnerability.\n \nIBM i Release  5770-SS1\n7.6 SJ06558   https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06558 \n7.5 SJ06557   https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06557 \n7.4 SJ06552   https://www.ibm.com/mysupport/s/fix-information?legacy=SJ06552 \n7.3 SJ06550   https://www.ibm.com/support/fixcentral \n\nImportant note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products."}],"source":{"discovery":"UNKNOWN"},"title":"IBM i authentication bypass","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-36119","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-08-13T15:03:47.107444Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:49:46.611Z"}}]}}