Overview
The cybersecurity landscape continually grapples with newly discovered vulnerabilities, one of which is CVE-2025-36004. This particular vulnerability pertains to IBM i versions 7.2, 7.3, 7.4, and 7.5. It’s a serious issue that potentially allows a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. This vulnerability matters because a malicious actor could exploit it to run user-controlled code with administrator privileges, potentially leading to system compromise or data leakage. Both IBM i users and administrators need to be aware of this vulnerability and take the necessary steps to mitigate its risks.
Vulnerability Summary
CVE ID: CVE-2025-36004
Severity: High (8.8 CVSS Score)
Attack Vector: Local
Privileges Required: Low
User Interaction: Required
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
IBM i | 7.2
IBM i | 7.3
IBM i | 7.4
IBM i | 7.5
How the Exploit Works
The exploit works by taking advantage of an unqualified library call in IBM Facsimile Support for i. In simple terms, an unqualified library call is when a program doesn’t specify the library that is to be used for a certain function. This can lead to the wrong library being called and manipulated, especially if a malicious user is aware of this vulnerability. In this case, the malicious user can insert their own library into the library list, which would then be called instead of the intended library. This could allow the user to run their own code with elevated privileges.
Conceptual Example Code
Below is a conceptual example of how this type of vulnerability might be exploited. This example uses a shell command to illustrate the point:
# Add malicious library to the library list
ADDLIBLE LIB(MALICIOUS_LIB)
# Call function that has an unqualified library call
CALL PGM(IBM_FAX_FUNC)
In this example, the `ADDLIBLE` command is used to add the malicious library to the library list. Then, when the `CALL` command is used to call a function that has an unqualified library call, the system could potentially call the malicious library instead of the intended one. This could allow the malicious user to run their own code with elevated privileges.