AIX

AIX

Connect, learn, share, and engage with IBM Power.

 View Only
Expand all | Collapse all

IBM urges quick vulnerability patch AIX

  • 1.  IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 08:51 AM

    "IBM "strongly recommends" customers running its Advanced Interactive eXecutive (AIX) operating system apply patches after disclosing two critical vulnerabilities, one of which has a perfect 10 severity score."

    https://www.theregister.com/2025/03/19/ibm_aix_critical_vulnerabilities/



    ------------------------------
    Jack Woehr
    Senior Consultant
    Seiden Group LLC
    Beulah CO
    3038478442
    ------------------------------


  • 2.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 08:57 AM

    You can subscribe to notifications such as these with 

    https://www.ibm.com/support/mynotifications



    ------------------------------
    Robert Berendt IBMChampion
    Business Systems Analyst, Lead
    Dekko
    Fort Wayne
    ------------------------------



  • 3.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 09:08 AM

    FYI IBM Support confirmed to me that if you stop the nimesis subsystem on the NIM master, and nimsh subsystems on the clients, then you are not vulnerable. You can stop the services until you can patch.



    ------------------------------
    ========================
    Russell Adams
    https://adamssystems.nl/
    ========================
    ------------------------------



  • 4.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 05:22 PM

    Yet another embarrassing AIX security debacle



    ------------------------------
    Stefan Coussens
    ------------------------------



  • 5.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 06:06 PM

    As we say, "$4!+ happens!"
    Even OpenBSD has occasionally had exploits.
    Perfection is not to be had in this world of toil and sorrows ...
    We'll always need to back up, air gap, and patch.
    That's our job, right?!



    ------------------------------
    Jack Woehr
    Senior Consultant
    Seiden Group LLC
    Beulah CO
    3038478442
    ------------------------------



  • 6.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 05:23 AM

    Unlike some of the security debacles with other OS', I don't see this one stopping half the world......



    ------------------------------
    Phill Rowbottom
    Unix Consultant
    Service Express
    Bedford
    ------------------------------



  • 7.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 05:38 PM

     So, we have some legacy systems we are stuck on. Mostly AIX 7.1.   Are these systems vulnerable to these exploits?



    ------------------------------
    Charles Buckley
    ------------------------------



  • 8.  RE: IBM urges quick vulnerability patch AIX

    Posted Thu March 20, 2025 06:11 PM

    "However, versions 7.2 and 7.3 are both vulnerable and should be updated immediately, Big Blue says." - from the cited article.
    From AIX Standard Edition_7.1.0 - Withdrawal notification we see:

    Lifecycle dates, announcement letters and other information

    GA
    10-Sep-2010 , 210-200
    EOM
    23-Nov-2021 , 921-107
    EOS
    30-Apr-2023 , 921-107
    Extension, Extended, or Sustained Support ends
    30-Apr-2026

    ... So I guess if you are vulnerable and have extended support, you'll get a patch.


    ------------------------------
    Jack Woehr
    Senior Consultant
    Seiden Group LLC
    Beulah CO
    3038478442
    ------------------------------



  • 9.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 10:50 AM

    Well..  I don't know if I have the vulnerability on my legacy systems, which is why I am asking if this affects AIX 7.1. 

    There's no details I have seen on how the exploit works so we can't evaluate the situation.  Even if there is a patch, we won't be getting it and there is also the question of the exposure in the meantime before any such patch is released. We have a mitigation plan, but I really, really need to know if we have to pull the trigger on it as it's a bit drastic.



    ------------------------------
    Charles Buckley
    ------------------------------



  • 10.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 10:54 AM

    @Charles Buckley I'll ask around



    ------------------------------
    Jack Woehr
    Senior Consultant
    Seiden Group LLC
    Beulah CO
    3038478442
    ------------------------------



  • 11.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 12:38 PM

    @Charles Buckley ... from an IBM Distinguished Engineer:
    "AIX 7.1 is impacted. Clients with extended support can open a support case and request a fix."



    ------------------------------
    Jack Woehr
    Senior Consultant
    Seiden Group LLC
    Beulah CO
    3038478442
    ------------------------------



  • 12.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 01:05 PM

    Thanks. Appreciate the response.



    ------------------------------
    Charles Buckley
    ------------------------------



  • 13.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 08:28 AM

    Thank you for the head's up.  I'm sure it is going to be popping up via our Security team's Qualys alerting very soon.  Will get the teams to take a look at it today for possible impact.



    ------------------------------
    Stephan Durand
    Manager Information Technology – Storage & Backups, Disaster Recovery & Infra *NIX
    Rona Inc
    Boucherville QC
    5145995900
    ------------------------------



  • 14.  RE: IBM urges quick vulnerability patch AIX

    Posted Fri March 21, 2025 08:44 AM

    We also use Qualys.  Normally what I see on their reports involves routine testing like obsolete ciphers, old releases of Bind, etc.  Let me know if that appears on your reports.  If they get down to the level of reporting this kind of stuff I'd be impressed.  Most of their stuff tries to stay OS agnostic so having to do stuff like 

    aix:  lslpp -L | grep -i bos.sysmgt.nim.client

    IBM i:  DSPPTF...

    is beyond their scope.



    ------------------------------
    Robert Berendt IBMChampion
    Business Systems Analyst, Lead
    Dekko
    Fort Wayne
    ------------------------------



  • 15.  RE: IBM urges quick vulnerability patch AIX

    Posted 29 days ago

    AIX 7.2 and 7.3 are vulnerable as noted in bulletin. Also, filesets 7.3.1.x are vulnerable. But, if I have nim clients with bos.sysmgt.nim.client and bos.sysmgt.sysbr filesets on 7.3.1.1 level installed on AIX 7300-01-02-2320 level, this is not vulnerable or there is no fix for this combo?



    ------------------------------
    Ivan Tuda
    ------------------------------



  • 16.  RE: IBM urges quick vulnerability patch AIX

    Posted 29 days ago

    It makes sense that the 7300-01-04-2420 service pack is required but I don't have a system to validate that.

    Note you only have till the end of the year to migrate from 7.3.1 to 7.3.2 or 7.3.3.



    ------------------------------
    Alexander Pettitt
    ------------------------------



  • 17.  RE: IBM urges quick vulnerability patch AIX

    Posted 28 days ago

    I suggest to open a support case to request an i-fix for your 7.3.1.1 level. Support may direct you to first move to a newer service pack. As was noted by Alexander, 7.3.1 goes out of support in Dec.



    ------------------------------
    Carl Burnett
    DE, IBM Infrastructure, IBM Power
    ------------------------------