Cyber Posture

CVE-2024-56347

Critical

Published: 18 March 2025

Published
18 March 2025
Modified
25 July 2025
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0046 64.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-56347 is a critical-severity Process Control (CWE-114) vulnerability in Ibm Aix. Its CVSS base score is 9.6 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SC-39 (Process Isolation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the vulnerability by applying IBM patches to fix improper process controls in the nimsh SSL/TLS mechanisms.

prevent

Enforces process isolation to counter improper process controls that enable arbitrary command execution in the nimsh service.

prevent

Applies least privilege to the nimsh service process, limiting the scope and impact of arbitrary command execution by a remote attacker.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability enables remote arbitrary command execution on the nimsh service (public-facing with AV:N), directly mapping to T1190 for exploitation of public-facing applications and facilitating T1059.004 for Unix shell command execution on AIX.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.

Deeper analysisAI

CVE-2024-56347 is a high-severity vulnerability in the nimsh service of IBM AIX 7.2 and 7.3. It arises from improper process controls in the SSL/TLS protection mechanisms, potentially allowing a remote attacker to execute arbitrary commands. The issue has a CVSS v3.1 base score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) and maps to CWE-114 (Process Control). The vulnerability was published on 2025-03-18.

A remote attacker can exploit this over the network with low attack complexity and no privileges required, though user interaction is necessary. Upon successful exploitation, the attacker gains high-impact access to confidentiality, integrity, and availability, with a changed scope, enabling arbitrary command execution on the affected AIX system.

IBM provides details on mitigation in their security bulletin at https://www.ibm.com/support/pages/node/7186621.

Details

CWE(s)

Affected Products

ibm
aix
7.2, 7.3

CVEs Like This One

CVE-2024-56346Same product: Ibm Aix
CVE-2025-36251Same product: Ibm Aix
CVE-2025-36250Same product: Ibm Aix
CVE-2025-0160Same vendor: Ibm
CVE-2025-36236Same product: Ibm Aix
CVE-2025-13688Same vendor: Ibm
CVE-2025-13686Same vendor: Ibm
CVE-2025-13687Same vendor: Ibm
CVE-2024-49352Same vendor: Ibm
CVE-2025-3320Same vendor: Ibm

References