Cyber Posture

CVE-2025-64120

High

Published: 02 January 2026

Published
02 January 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0034 56.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows OS Command Injection.This issue affects Multi-Stack Controller (MSC): from 2.3.8 before 2.5.1.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires input validation mechanisms to neutralize special elements in OS commands, preventing command injection exploits in the MSC.

prevent

Mandates identification, reporting, and correction of flaws like this OS command injection vulnerability through timely patching to version 2.5.1 or later.

preventdetect

Enables vulnerability scanning to identify and remediate OS command injection flaws in the affected MSC versions before exploitation.

Security SummaryAI

CVE-2025-64120 is an Improper Neutralization of Special Elements used in an OS Command, classified as an OS Command Injection vulnerability (CWE-78), in the Nuvation Energy Multi-Stack Controller (MSC). This issue affects MSC versions from 2.3.8 up to but not including 2.5.1. The vulnerability was published on 2026-01-02 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An attacker with low privileges can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Successful exploitation allows arbitrary OS command injection, resulting in high impacts to confidentiality, integrity, and availability, potentially leading to full system compromise on the affected MSC device.

A related advisory is available from Dragos at https://www.dragos.com/community/advisories/CVE-2025-64119. Mitigation involves updating the Multi-Stack Controller to version 2.5.1 or later.

Details

CWE(s)

Affected Products

nuvationenergy
nplatform
2.3.8 — 2.5.1

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

OS command injection allows remote low-privilege attackers to execute arbitrary commands on the device, directly facilitating exploitation of remote services (T1210), command interpreter execution (T1059.004), and privilege escalation to full system compromise (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References