IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
A critical security vulnerability has been identified in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM i, potentially exposing enterprise environments to privilege escalation attacks.
The flaw, tracked as CVE-2025-33108, affects versions 7.4 and 7.5 of the BRMS software, which are widely used for automating backup and recovery operations on IBM i systems.
Nature of the Vulnerability
The vulnerability arises from a library unqualified call within the BRMS software.
This technical oversight means the program references system libraries without specifying secure paths, allowing users with the ability to compile or restore programs to redirect those calls to their code.
In practical terms, a malicious actor with limited privileges could exploit this flaw to execute arbitrary, user-controlled code with elevated system access, potentially compromising the entire host operating system.
Summary of the vulnerability | Details |
CVE ID | CVE-2025-33108 |
Affected Products | IBM Backup, Recovery and Media Services for i 7.4, 7.5 |
Severity | High (CVSS 8.5) |
Security experts have classified this as a high-severity issue, assigning it a CVSS base score of 8.5. The vulnerability is categorized under CWE-250: Execution with Unnecessary Privileges, highlighting the risk of excessive permissions being granted to user processes.
Affected Versions and Remediation
IBM has confirmed that the following products and versions are vulnerable:
- IBM Backup, Recovery and Media Services for i 7.5
- IBM Backup, Recovery and Media Services for i 7.4
To address the vulnerability, IBM has released Program Temporary Fixes (PTFs):
- For IBM i 7.5: PTF SJ05907
- For IBM i 7.4: PTF SJ05906
Administrators are strongly urged to apply these patches immediately to mitigate the risk of exploitation. No effective workarounds or mitigations are available beyond applying the official fixes.
Security professionals recommend the following measures:
- Apply IBM’s security patches as soon as possible
- Restrict user privileges and access to BRMS systems
- Implement strict access controls and monitor program compilation and restoration activities
- Use network segmentation to limit potential attack surfaces
No public proof-of-concept exploit has been reported, and there is no evidence of active exploitation at this time.
Organizations running affected versions of IBM BRMS should prioritize patching to safeguard their systems against this high-severity threat.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
Source link