Cyber Posture

CVE-2025-12422

Critical

Published: 28 October 2025

Published
28 October 2025
Modified
07 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-12422, published on 2025-10-28, is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) stemming from a vulnerable upgrade feature that enables arbitrary file write (CWE-22). This flaw affects BLU-IC2 devices through version 1.19.5 and BLU-IC4 devices through version 1.19.5, potentially allowing attackers to obtain super user permissions on the board.

The vulnerability can be exploited by unauthenticated remote attackers requiring low complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, culminating in full super user privileges on the affected device.

Mitigation details are available in the security advisory at https://azure-access.com/security-advisories.

Details

CWE(s)
CWE-22

Affected Products

azure-access
blu-ic2 firmware
≤ 1.20
azure-access
blu-ic4 firmware
≤ 1.20

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation of a public-facing upgrade feature (arbitrary file write) to gain super user privileges, directly mapping to T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References