CVE-2025-0680
Published: 30 January 2025
Summary
CVE-2025-0680 is a critical-severity OS Command Injection (CWE-78) vulnerability in Cisa (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and IA-8 (Identification and Authentication (Non-organizational Users)).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CWE-78 OS command injection in the device cloud RPC command handling by validating and sanitizing inputs to prevent malicious command execution.
Requires identification and authentication for non-organizational users interacting with the cloud RPC service, blocking unauthenticated remote exploitation.
Establishes controls and authorization for remote access to the device cloud service, preventing unauthorized remote attackers from reaching the vulnerable RPC handling process.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CWE-78 OS command injection in public cloud RPC handler enables remote unauthenticated RCE on devices (T1190 for public-facing exploitation; T1059 for arbitrary command execution).
NVD Description
Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud.
Deeper analysisAI
CVE-2025-0680 is a critical vulnerability in the device cloud RPC command handling process present in affected products. Classified under CWE-78, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.
Remote, unauthenticated attackers can exploit this vulnerability to gain control over arbitrary devices connected to the cloud service. Exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing full takeover of targeted devices.
Mitigation guidance is available in CISA ICS Advisory ICSA-25-030-02 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02, along with vendor resources at https://www.newrocktech.com/ContactUs/index.html.
Details
- CWE(s)