Update: Malicious code vulnerability threatens IBM Data Replication VSAM

Attackers can attack IBM Data Replication VSAM for z/OS Remote Source. The gap has now been closed.

listen Print view
A symbolic update bar fills up.

(Image: AFANASEV IVAN/Shutterstock.com)

1 min. read

Under certain conditions, attacks on IBM Data Replication VSAM for z/OS Remote Source are possible. In the worst case, malicious code can compromise systems. A security update provides a remedy.

IBM Data Replication VSAM for z/OS Remote Source is primarily responsible for synchronizing changes between databases.

As the developers describe in a warning message, local attackers can trigger memory errors due to inadequate checks to execute malicious code on systems. All versions are said to be at risk. The developers assure that they have closed the vulnerability (CVE-2025-36156 “high”) in the APAR PH67757 release (v11.4.0.22 for VSAM Remote source x86 container on fix central and VSAM_Remote_Source_114_Linux_x86.tar).

Videos by heise

So far, there have been no reports of attacks. It also remains unclear how admins can recognize systems that have already been attacked.

IBM developers only recently closed gaps in Security Verify Access and AIX/VIOS.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.