Ibm I vulnerabilities
60 known vulnerabilities affecting ibm/i.
Total CVEs
60
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH30MEDIUM25LOW3
Vulnerabilities
Page 1 of 3
CVE-2026-1376HIGHCVSS 7.5v7.62026-03-17
CVE-2026-1376 [HIGH] CWE-770 CVE-2026-1376: IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication con
IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.
cvelistv5nvd
CVE-2025-36371MEDIUMCVSS 6.5v7.2v7.3+3 more2025-11-19
CVE-2025-36371 [MEDIUM] CWE-598 CVE-2025-36371: IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 are impacted by obtaining an information vulnerability in the data
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 are impacted by obtaining an information vulnerability in the database plan cache implementation. A user with access to the database plan cache could see information they do not have authority to view.
cvelistv5nvd
CVE-2025-36367HIGHCVSS 8.8v7.2v7.3+3 more2025-11-01
CVE-2025-36367 [HIGH] CWE-862 CVE-2025-36367: IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i S
IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.
cvelistv5nvd
CVE-2025-36119HIGHCVSS 8.8v7.3v7.4+2 more2025-08-08
CVE-2025-36119 [HIGH] CWE-290 CVE-2025-36119: IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with
IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator.
cvelistv5nvd
CVE-2025-33109HIGHCVSS 8.8v7.2v7.3+4 more2025-07-24
CVE-2025-33109 [HIGH] CWE-250 CVE-2025-33109: IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid datab
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid database authority check. A bad actor could execute a database procedure or function without having all required permissions, in addition to causing denial of service for some database actions.
cvelistv5nvd
CVE-2025-36004HIGHCVSS 8.8v7.2v7.3+2 more2025-06-25
CVE-2025-36004 [HIGH] CWE-427 CVE-2025-36004: IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified li
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege.
cvelistv5nvd
CVE-2025-33122HIGHCVSS 7.5v7.2v7.3+3 more2025-06-17
CVE-2025-33122 [HIGH] CWE-427 CVE-2025-33122: IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualifi
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege.
cvelistv5nvd
CVE-2025-33108HIGHCVSS 8.8v7.4v7.52025-06-14
CVE-2025-33108 [HIGH] CWE-250 CVE-2025-33108: IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to
IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system.
nvd
CVE-2025-33103HIGHCVSS 8.8v7.2v7.3+3 more2025-05-17
CVE-2025-33103 [HIGH] CWE-250 CVE-2025-33103: IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 product IBM TCP/IP Connectivity Utilities for i contains a privile
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 product IBM TCP/IP Connectivity Utilities for i contains a privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system.
cvelistv5nvd
CVE-2025-3218MEDIUMCVSS 5.4v7.2v7.3+3 more2025-05-07
CVE-2025-3218 [MEDIUM] CWE-295 CVE-2025-3218: IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to authentication and authorization attacks due to i
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to authentication and authorization attacks due to incorrect validation processing in IBM i Netserver. A malicious actor could use the weaknesses, in conjunction with brute force authentication attacks or to bypass authority restrictions, to access the server.
cvelistv5nvd
CVE-2025-2950MEDIUMCVSS 5.4v7.3v7.4+2 more2025-04-18
CVE-2025-2950 [MEDIUM] CWE-644 CVE-2025-2950: IBM i 7.3, 7.4, 7.5, and 7.5 is vulnerable to a host header injection attack caused by improper neut
IBM i 7.3, 7.4, 7.5, and 7.5 is vulnerable to a host header injection attack caused by improper neutralization of HTTP header content by IBM Navigator for i. An authenticated user can manipulate the host header in HTTP requests to change domain/IP address which may lead to unexpected behavior.
cvelistv5nvd
CVE-2025-2947CRITICALCVSS 9.8v7.62025-04-17
CVE-2025-2947 [HIGH] CWE-278 CVE-2025-2947: IBM i 7.6
contains a privilege escalation vulnerability due to incorrect profile swapping in an OS
IBM i 7.6
contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. A malicious actor can use the command to elevate privileges to gain root access to the host operating system.
cvelistv5nvd
CVE-2024-55898HIGHCVSS 8.5v7.2v7.3+3 more2025-02-24
CVE-2024-55898 [HIGH] CWE-427 CVE-2024-55898: IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege.
cvelistv5nvd
CVE-2024-52895MEDIUMCVSS 6.5v7.4v7.5+2 more2025-02-14
CVE-2024-52895 [MEDIUM] CWE-754 CVE-2024-52895: IBM i 7.4 and 7.5 is vulnerable to a database access denial of service caused by a bypass of a datab
IBM i 7.4 and 7.5 is vulnerable to a database access denial of service caused by a bypass of a database capabilities restriction check. A privileged bad actor can remove or otherwise impact database infrastructure files resulting in incorrect behavior of software products that rely upon the database.
cvelistv5nvd
CVE-2024-35122LOWCVSS 2.8v7.2v7.3+2 more2025-01-24
CVE-2024-35122 [LOW] CWE-266 CVE-2024-35122: IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insu
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file.
cvelistv5nvd
CVE-2024-55897MEDIUMCVSS 4.3v7.4, 7.52025-01-03
CVE-2024-55897 [MEDIUM] CWE-614 CVE-2024-55897: IBM PowerHA SystemMirror for i 7.4 and 7.5
does not set the secure attribute on authorization toke
IBM PowerHA SystemMirror for i 7.4 and 7.5
does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie valu
cvelistv5nvd
CVE-2024-55896MEDIUMCVSS 5.4v7.4v7.5+1 more2025-01-03
CVE-2024-55896 [MEDIUM] CWE-451 CVE-2024-55896: IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via
IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system.
cvelistv5nvd
CVE-2024-51464MEDIUMCVSS 4.3PoCv7.3v7.4+2 more2024-12-21
CVE-2024-51464 [MEDIUM] CWE-288 CVE-2024-51464: IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sendi
IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i.
cvelistv5nvd
CVE-2024-51463MEDIUMCVSS 5.4PoCv7.3v7.4+2 more2024-12-21
CVE-2024-51463 [MEDIUM] CWE-918 CVE-2024-51463: IBM i 7.3, 7.4, and 7.5
is vulnerable to server-side request forgery (SSRF). This may allow an aut
IBM i 7.3, 7.4, and 7.5
is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
cvelistv5nvd
CVE-2024-47104MEDIUMCVSS 6.8v7.4v7.5+1 more2024-12-18
CVE-2024-47104 [MEDIUM] CWE-732 CVE-2024-47104: IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical fi
IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical file. A malicious actor can use the elevated privileges to perform actions restricted by their view pr
cvelistv5nvd
1 / 3Next →