Cyber Posture

CVE-2025-25067

CriticalRCE

Published: 13 February 2025

Published
13 February 2025
Modified
23 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0092 76.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25067 is a critical-severity OS Command Injection (CWE-78) vulnerability in Myscada Mypro. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of flaws such as the OS command injection vulnerability in CVE-2025-25067, including applying vendor patches.

prevent

SI-10 enforces validation of all inputs to mySCADA myPRO Manager, directly preventing malicious payloads from enabling OS command injection in CVE-2025-25067.

detect

SI-4 provides continuous monitoring to identify indicators of successful OS command injection exploitation from CVE-2025-25067, such as anomalous processes or system calls.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote OS command injection in public-facing app directly enables T1190 for initial access via exploitation and T1059 for arbitrary command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands.

Deeper analysisAI

CVE-2025-25067 is an OS command injection vulnerability (CWE-78) in mySCADA myPRO Manager. This flaw allows a remote attacker to execute arbitrary OS commands on affected systems. The vulnerability was published on 2025-02-13T22:15:12.780 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.

Any remote attacker can exploit this vulnerability without authentication by sending malicious input to the affected component in mySCADA myPRO Manager. Successful exploitation enables arbitrary OS command execution, granting high-impact control over confidentiality, integrity, and availability of the targeted system.

Mitigation guidance is available in the CISA ICS advisory ICSA-25-044-16 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16. Vendor resources, including contacts and downloads potentially containing patches, are provided at https://www.myscada.org/contacts/ and https://www.myscada.org/downloads/mySCADAPROManager/.

Details

CWE(s)

Affected Products

myscada
mypro
≤ 1.4

CVEs Like This One

CVE-2025-24865Same product: Myscada Mypro
CVE-2025-22896Same product: Myscada Mypro
CVE-2025-36604Shared CWE-78
CVE-2025-61304Shared CWE-78
CVE-2025-63911Shared CWE-78
CVE-2026-22901Shared CWE-78
CVE-2026-25108Shared CWE-78
CVE-2025-54795Shared CWE-78
CVE-2026-1345Shared CWE-78
CVE-2025-56590Shared CWE-78

References