Cyber Posture

CVE-2025-0680

CriticalRCE

Published: 30 January 2025

Published
30 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0081 74.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0680 is a critical-severity OS Command Injection (CWE-78) vulnerability in Cisa (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and IA-8 (Identification and Authentication (Non-organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CWE-78 OS command injection in the device cloud RPC command handling by validating and sanitizing inputs to prevent malicious command execution.

prevent

Requires identification and authentication for non-organizational users interacting with the cloud RPC service, blocking unauthenticated remote exploitation.

prevent

Establishes controls and authorization for remote access to the device cloud service, preventing unauthorized remote attackers from reaching the vulnerable RPC handling process.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

CWE-78 OS command injection in public cloud RPC handler enables remote unauthenticated RCE on devices (T1190 for public-facing exploitation; T1059 for arbitrary command execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud.

Deeper analysisAI

CVE-2025-0680 is a critical vulnerability in the device cloud RPC command handling process present in affected products. Classified under CWE-78, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.

Remote, unauthenticated attackers can exploit this vulnerability to gain control over arbitrary devices connected to the cloud service. Exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing full takeover of targeted devices.

Mitigation guidance is available in CISA ICS Advisory ICSA-25-030-02 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02, along with vendor resources at https://www.newrocktech.com/ContactUs/index.html.

Details

CWE(s)

Affected Products

Cisa
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-36604Shared CWE-78
CVE-2025-61304Shared CWE-78
CVE-2025-63911Shared CWE-78
CVE-2026-22901Shared CWE-78
CVE-2026-25108Shared CWE-78
CVE-2025-54795Shared CWE-78
CVE-2026-1345Shared CWE-78
CVE-2025-56590Shared CWE-78
CVE-2026-28291Shared CWE-78
CVE-2024-58274Shared CWE-78

References