IBM has released security patches to address these high-severity flaws affecting multiple Unix-based operating system versions.
Security researchers have identified two serious vulnerabilities in IBM AIX systems that pose significant threats to enterprise environments.
The vulnerabilities tracked as CVE-2024-56346 and CVE-2024-56347 both relate to improper process controls in AIX Network Installation Management (NIM) services.
This vulnerability affects the nimesis Network Installation Management (NIM) master service in IBM AIX. It has been assigned the highest possible CVSS Base score of 10.0, indicating critical severity.
This flaw could allow remote attackers to execute arbitrary commands on affected systems without requiring any authentication or user interaction.
The second vulnerability (CVE-2024-56347) impacts the AIX nimsh service SSL/TLS protection mechanisms and has been assigned a CVSS Base score of 9.6.
This vulnerability also enables remote attackers to execute arbitrary commands, though it requires some user interaction. Both vulnerabilities stem from CWE-114 (Process Control) weaknesses in the implementation of these services.
Given that AIX is often used in critical applications across finance, banking, healthcare, and telecommunications sectors, successful exploitation could have wide-ranging consequences.
Additionally, these vulnerabilities are particularly concerning due to their high CVSS scores. If left unpatched, attackers could gain unauthorized access to critical AIX systems, potentially leading to data theft, service disruption, or lateral movement within networks.
The vulnerabilities were reported to IBM by Oneconsult AG, specifically security researcher Jan Alsenz.
The summary of the vulnerabilities is given below:
| Risk Factors | CVE-2024-56346 | CVE-2024-56347 |
| Affected Products | IBM AIX 7.2, 7.3 (including VIOS) | IBM AIX 7.2, 7.3 (including VIOS) |
| Impact | Remote execution of arbitrary commands | Remote execution of arbitrary commands |
| Exploit Prerequisites | No authentication or user interaction required) | No authentication or user interaction is required) |
| CVSS 3.1 Score | 10.0 (Critical) | 9.6 (Critical) |
The security flaws affect IBM AIX versions 7.2 and 7.3, including systems running on Virtual I/O Server (VIOS) environments. Specific affected filesets include:
Organizations can determine if their systems are vulnerable by checking the installed filesets using the AIX command: lslpp -L | grep -i bos.sysmgt.nim.client.
IBM has addressed these vulnerabilities by releasing patches for affected systems. The company has assigned specific APARs (Authorized Program Analysis Reports) to track the fixes:
Security patches are available for download from IBM’s security fix portal. The company has provided interim fixes for both NIM clients and NIM masters across various AIX technology levels.
System administrators can verify the integrity of downloaded fixes using the provided SHA-256 checksums or OpenSSL signatures. IBM recommends creating a mksysb backup of systems before applying patches.
IBM strongly recommends that all affected organizations apply security updates immediately to mitigate the risk of potential attacks targeting these vulnerabilities.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The post IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands appeared first on Cyber Security News.
A new weekend has arrived, and today, you can save big on Castlevania: The Complete…
Mojang Studios has officially announced that Minecraft Dungeons 2 is in development with plans to…
Mojang Studios has unveiled more information about updates coming to Minecraft in 2026, including the…
Minecraft World, a theme park based on the video game from Mojang Studios, will officially…
Concord police arrested a man they say was exposing himself in a private apartment complex.…
Mojang Studios has returned for a March 2026 edition of Minecraft Live, and we're here…
This website uses cookies.