Advisory

IBM Tivoli Monitoring critical vulnerability allows remote code execution

Take action: If you are running IBM Tivoli Monitoring, make sure it's isolated from the internet and accessible only from trusted networks. Then plan a quick patch cycle. Don't ignore this one, someone will find a way to exploit it.


Learn More

IBM has addressed a critical security vulnerability in its Tivoli Monitoring infrastructure management software that could allow remote attackers to execute arbitrary code on affected systems. 

The vulnerability is tracked as CVE-2025-3357 (CVSS score 9.8) - Improper validation of an index value of a dynamically allocated array allowing remote code execution. It stems from insufficient validation of input data of an index value of a dynamically allocated array. It could enable remote attackers to execute arbitrary code without requiring authentication or user interaction.

Affected versions include IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 across multiple operating systems including AIX, Linux, and Windows.

IBM has released a security patch to address this critical vulnerability. The company strongly recommends that users immediately upgrade to IBM Tivoli Monitoring version 6.3.0.7-SP0020 (Service Pack 20). 

No workarounds or alternative mitigation strategies are available, making the upgrade the only viable solution to protect against potential exploitation.

IBM Tivoli Monitoring critical vulnerability allows remote code execution