IBM’s Personal Communications (PCOM) terminal emulator, used for accessing critical business systems and host communication on Windows systems, has been found vulnerable to a critical flaw (CVE-2024-25029). This vulnerability could allow threat actors to execute arbitrary code remotely and escalate privileges locally, posing a serious risk to organizations relying on PCOM for their operations.
IBM has released a Security Bulletin (7147672), advisory, and client update to address the issue, although the exploitability of the vulnerability remains uncertain. With no known workarounds available, immediate action is necessary to mitigate the potential impact of this vulnerability.
The vulnerability in PCOM, flagged by IBM as an “Improper Restriction of Operations within the Bounds of the Memory Buffer” (Buffer overflow) flaw, underscores the importance of addressing memory-related vulnerabilities promptly. Buffer overflow vulnerabilities can be exploited by attackers to execute arbitrary code or access sensitive information, with the potential for wide abuse.
IBM has rated this vulnerability with a CVSS base score of 9, highlighting its critical nature. Organizations using the PCOM package are strongly advised to upgrade to the patched versions provided by IBM in their Security Bulletin to safeguard against potential exploitation and protect their systems from unauthorized access and malicious activities.