CVE-2025-25067
Published: 13 February 2025
Summary
CVE-2025-25067 is a critical-severity OS Command Injection (CWE-78) vulnerability in Myscada Mypro. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and correction of flaws such as the OS command injection vulnerability in CVE-2025-25067, including applying vendor patches.
SI-10 enforces validation of all inputs to mySCADA myPRO Manager, directly preventing malicious payloads from enabling OS command injection in CVE-2025-25067.
SI-4 provides continuous monitoring to identify indicators of successful OS command injection exploitation from CVE-2025-25067, such as anomalous processes or system calls.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote OS command injection in public-facing app directly enables T1190 for initial access via exploitation and T1059 for arbitrary command execution.
NVD Description
mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands.
Deeper analysisAI
CVE-2025-25067 is an OS command injection vulnerability (CWE-78) in mySCADA myPRO Manager. This flaw allows a remote attacker to execute arbitrary OS commands on affected systems. The vulnerability was published on 2025-02-13T22:15:12.780 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.
Any remote attacker can exploit this vulnerability without authentication by sending malicious input to the affected component in mySCADA myPRO Manager. Successful exploitation enables arbitrary OS command execution, granting high-impact control over confidentiality, integrity, and availability of the targeted system.
Mitigation guidance is available in the CISA ICS advisory ICSA-25-044-16 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16. Vendor resources, including contacts and downloads potentially containing patches, are provided at https://www.myscada.org/contacts/ and https://www.myscada.org/downloads/mySCADAPROManager/.
Details
- CWE(s)