CVE-2025-64128
Published: 26 November 2025
Description
An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-supplied inputs to prevent OS command injection due to incomplete formatting rules.
Enforces input restrictions including validation and rejection of invalid inputs, mitigating injection of arbitrary data.
Remediates the specific flaw in firmware validation, addressing exploitation of this CVE via patching.
Security SummaryAI
CVE-2025-64128 is an OS command injection vulnerability (CWE-78) due to incomplete validation of user-supplied input in the Zenitel Station and Device Firmware Package (VS-IS). Insufficient formatting rules in the validation process allow attackers to append arbitrary data, enabling the injection of arbitrary OS commands. The vulnerability was published on 2025-11-26 and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
An unauthenticated attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges or user interaction. Exploitation allows injection of arbitrary commands, potentially resulting in high impacts to confidentiality, integrity, and availability with a changed scope.
Mitigation details are provided in official advisories, including CISA ICS Advisory ICSA-25-329-03 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-329-03, the Zenitel wiki downloads page for Station and Device Firmware Package (VS-IS) at https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29, and the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-329-03.json.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection in network-facing firmware enables T1190 (Exploit Public-Facing Application) and directly facilitates arbitrary Unix shell command execution via T1059.004.