CVE-2025-54964
Published: 23 October 2025
Summary
CVE-2025-54964 is a high-severity Command Injection (CWE-77) vulnerability in Baesystems Socet Gxp. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 44.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by validating and rejecting invalid inputs at GXP Job Service entry points.
Mandates timely flaw remediation via patching to version 4.6.0.2, eliminating the command injection vulnerability.
Limits damage from injected executables by enforcing least privilege on the GXP Job Service process, mitigating privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables local privilege escalation via command injection (T1068) and remote command execution if the Job Service is network-accessible (T1210).
NVD Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. An attacker with the ability to interact with the GXP Job Service may inject arbitrary executables. If the Job Service is configured for local-only access, this may allow for privilege…
more
escalation in certain situations. If the Job Service is network accessible, this may allow remote command execution.
Deeper analysisAI
CVE-2025-54964 is a command injection vulnerability (CWE-77) discovered in BAE SOCET GXP versions prior to 4.6.0.2, specifically affecting the GXP Job Service component. Published on 2025-10-23, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts from a low-complexity local attack requiring no privileges or user interaction.
An attacker with the ability to interact with the GXP Job Service can inject arbitrary executables. In configurations limited to local-only access, this may enable privilege escalation under certain conditions. If the Job Service is network accessible, exploitation can result in remote command execution.
Vendor advisories for BAE SOCET GXP, available at https://www.geospatialexploitationproducts.com/content/socet-gxp/vulnerabilities-disclosure/#cve-2025-54964 and https://www.baesystems.com/en-us/product/geospatial-exploitation-products, address the issue in version 4.6.0.2, recommending upgrade to mitigate the vulnerability.
Details
- CWE(s)