IBM i SQL Services Privilege Escalation (CVE-2025-36367): Brief Summary and Technical Review

This post provides a brief summary and technical review of CVE-2025-36367, a privilege escalation vulnerability in IBM i SQL services affecting versions 7.2 through 7.6. It covers technical details, affected versions, and vendor security history based on available sources.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-11-01

IBM i SQL Services Privilege Escalation (CVE-2025-36367): Brief Summary and Technical Review
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Privilege escalation on a core enterprise platform can mean the difference between a contained incident and a full system compromise. IBM i systems underpin critical operations in banking, manufacturing, and government, making any flaw in their security controls a matter of broad operational risk.

IBM i, formerly known as AS/400 and iSeries, is a foundational platform in the enterprise computing landscape. Used globally by thousands of organizations, it is recognized for its reliability and is central to many mission-critical workloads. IBM, as a vendor, has a significant presence in the technology sector with a diverse product portfolio and a long-standing influence on enterprise IT infrastructure.

Technical Information

CVE-2025-36367 is a privilege escalation vulnerability in IBM i SQL services, specifically affecting versions 7.2, 7.3, 7.4, 7.5, and 7.6. The vulnerability is rooted in an invalid or missing authorization check (CWE-862) within the SQL services component. This flaw allows an authenticated user to execute SQL procedures or functions using the elevated privileges of another user profile. The attacker does not need to possess elevated privileges initially but must have valid credentials to access the system.

The core issue is that SQL services fail to properly validate whether the requesting user has the necessary permissions to perform certain sensitive operations. As a result, a malicious actor can leverage this gap to escalate their privileges, ultimately gaining root access to the host operating system. The vulnerability is present across multiple major versions, indicating a longstanding flaw in the authorization logic of IBM i SQL services. No public code snippets or proof of concept are available for this vulnerability.

Affected Systems and Versions

CVE-2025-36367 affects the following IBM i versions:

  • IBM i 7.2
  • IBM i 7.3
  • IBM i 7.4
  • IBM i 7.5
  • IBM i 7.6

All configurations using IBM i SQL services on these versions are considered vulnerable unless patched.

Vendor Security History

IBM i has experienced several privilege escalation vulnerabilities in recent years. Notable examples include:

  • CVE-2025-33109: Privilege escalation due to invalid database authority check
  • CVE-2025-33103: Privilege escalation in TCP/IP Connectivity Utilities
  • CVE-2025-2947: Privilege escalation due to incorrect profile swapping in OS command

IBM's Product Security Incident Response Team (PSIRT) manages vulnerability disclosures and patch releases. The vendor typically provides timely advisories and security updates through its support channels.

References

Detect & fix
what others miss