Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-36250 PoC — IBM AIX和IBM VIOS 安全漏洞

Source
Associated Vulnerability
Title:IBM AIX和IBM VIOS 安全漏洞 (CVE-2025-36250)
Description:IBM AIX和IBM VIOS都是美国国际商业机器(IBM)公司的产品。IBM AIX是一款为 IBM Power 体系架构开发的一种基于开放标准的 UNIX 操作系统。IBM VIOS是PowerVm® Editions 硬件功能的一部分。有助于在服务器内的客户端逻辑分区之间共享物理 I/O 资源。 IBM AIX 7.2版本、7.3版本和IBM VIOS 3.1版本、4.1版本存在安全漏洞,该漏洞源于NIM服务器进程控制不当,可能导致远程攻击者执行任意命令。
Description
CVE-2025-36250
Readme
# 🚨 Critical Vulnerability Alert: CVE-2025-36250 Explained

![IBM AIX Vulnerability](https://github.com/user-attachments/assets/df7c0e8f-9312-4ee0-83a4-75618dcbc3de)

| Category                  | Details                                                                                          | Emoji Status      |
|---------------------------|--------------------------------------------------------------------------------------------------|-------------------|
| **CVE ID**                | CVE-2025-36250                                                                                   | 🆔                |
| **Severity**              | **CRITICAL** – CVSS 10.0 (perfect score)                                                         | 🔥🔥🔥           |
| **Published**             | November 13, 2025                                                                                | 📅                |
| **Type**                  | Remote Code Execution (RCE) via improper process controls                                        | 💀                |
| **Authentication**        | None required                                                                                    | 🚫🔐             |
| **Attack Complexity**     | Low                                                                                              | 😈                |
| **Exploit Status**        | No public PoC yet (as of Nov 17, 2025), but weaponization expected soon                           | ⏳                |

### What’s Vulnerable? 🎯
- IBM AIX 7.2 & 7.3 (specific TLs/SPs)
- IBM VIOS 3.1 & 4.1
- Service: **nimesis** (NIM master daemon) → often runs as root!

### CVSS v3.1 Vector (the scary one) 😱
```
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H → 10.0
```
Translation: “Internet stranger can own your AIX box with one packet”

### Exposed on the Internet? 🌐
- ~7.4 million AIX systems detectable (ZoomEye)
- ~8,600 active NIM services visible yearly (Hunter.io) → many unpatched!

### Patch Status (IBM dropped fixes FAST) 🛠️
- Interim fixes released Nov 12–13, 2025
- Download: https://aix.software.ibm.com/aix/efixes/security/nim_fix2.tar
- Key APARs: IJ55968, IJ56113, IJ56230, IJ55897
- Just run `emgr` or `installp` → reboot → you’re safe ✅

### Quick Workarounds (if you can’t patch today) ⚡
- Firewall NIM ports (default 1058/tcp) 🚧
- Enable TLS secure mode: `nimconfig -c` 🔒
- Disable NIM entirely if unused: `smitty nim` → stop master

### Detection Tips 🔍
- Check logs: `/var/adm/ras/nimesis.log`
- Verify fileset: `lslpp -L bos.sysmgt.nim.master`
- Scan with Nessus/Tenable → plugin ready!

### Social Buzz on X (Nov 13–17) 🐦
- “CVSS 10 RCE on AIX? Wake up, mainframe admins!” – @HunterMapping
- “7.4M exposed AIX boxes… someone’s getting owned this weekend” – @zoomeye_team
- “Chain it with key theft (CVE-2025-36096) → game over” – @PurpleOps_io

### Bottom Line 📢
If you run AIX or VIOS with NIM enabled → **patch TODAY**.  
This is the kind of 0-day that script kiddies dream about. Don’t be the headline.

Stay safe out there! 🛡️💙
File Snapshot

[4.0K] /data/pocs/5f62b16f94b14fa99d98e36dbfc04431b60ee6f6 └── [3.1K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.