Cyber Posture

CVE-2025-65084

Critical

Published: 25 November 2025

Published
25 November 2025
Modified
28 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An Out-of-Bounds Write vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the out-of-bounds write vulnerability by requiring timely remediation through patching the affected Ashlar-Vellum software versions.

prevent

Implements memory protections such as address space layout randomization and data execution prevention to block exploitation of the out-of-bounds write leading to arbitrary code execution.

detect

Enables vulnerability scanning to identify systems running vulnerable Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, or Cobalt Share versions 12.6.1204.207 and prior.

Security SummaryAI

CVE-2025-65084 is an Out-of-Bounds Write vulnerability (CWE-787) present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior. Published on 2025-11-25, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation could allow the attacker to disclose sensitive information or execute arbitrary code on the affected system.

Mitigation details are provided in the CISA ICS Advisory ICSA-25-329-01, available at https://www.cisa.gov/news-events/ics-advisories/icsa-25-329-01.

Details

CWE(s)

Affected Products

ashlar
argon
≤ 12.2.1204.207
ashlar
cobalt
≤ 12.2.1204.207
ashlar
cobalt share
≤ 12.2.1204.207
ashlar
lithium
≤ 12.2.1204.207
ashlar
xenon
≤ 12.2.1204.207

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated network exploitation leading to arbitrary code execution or information disclosure directly maps to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References