PatchSiren cyber security CVE debrief
CVE-2016-8972 IBM CVE debrief
CVE-2016-8972 is a local privilege-escalation issue in IBM AIX bellmail that could allow a local user to gain root privileges by using a specially crafted command. IBM’s advisory references APARs IV91006, IV91007, IV91008, IV91010, and IV91011. NVD published the record on 2017-02-15 and rates it High severity (CVSS 7.8).
- Vendor
- IBM
- Product
- CVE-2016-8972
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-15
- Advisory updated
- 2026-05-13
Who should care
AIX administrators, system owners, and security teams responsible for multi-user IBM Unix environments should prioritize this issue, especially where local shell access is possible. Teams managing IBM VIOS instances should also review NVD’s mapped CPE coverage.
Technical summary
The supplied description states that IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges through a specially crafted command in the bellmail client. The NVD record assigns CVSS 3.0 vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-264. In addition to the AIX versions named in the description, NVD’s CPE criteria also list multiple IBM VIOS versions as vulnerable.
Defensive priority
High. This is a local root privilege-escalation issue with full confidentiality, integrity, and availability impact once a local foothold exists.
Recommended defensive actions
- Review IBM’s advisory referenced by NVD and apply the vendor-provided fix packages or APAR remediation for the affected AIX releases.
- Confirm whether any systems run the bellmail client or related AIX mail tooling, and reduce local access where it is not required.
- Audit AIX and VIOS estates against the NVD CPE coverage to identify in-scope versions.
- Prioritize patching on systems with shared accounts, administrative operators, or any untrusted local users.
- Validate remediation by checking installed fix levels against IBM guidance before returning systems to service.
Evidence notes
All factual claims are drawn from the supplied NVD record and its referenced IBM advisory metadata. The record states AIX 6.1/7.1/7.2 are affected, identifies a local command-triggered root escalation path in bellmail, and lists IBM APARs IV91006, IV91007, IV91008, IV91010, and IV91011. NVD also includes IBM VIOS CPE entries and the CVSS 3.0 vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.
Official resources
-
CVE-2016-8972 CVE record
CVE.org
-
CVE-2016-8972 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mitigation, Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
Publicly disclosed in the NVD record on 2017-02-15, with IBM advisory references included in the NVD source metadata.