Cyber Posture

CVE-2025-61879

High

Published: 12 February 2026

Published
12 February 2026
Modified
19 February 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0001 2.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61879 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Infoblox Nios. Its CVSS base score is 7.7 (High).

Operationally, ranked at the 2.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CWE-73 by validating inputs to the account creation mechanism, preventing external control of file names or paths that enable arbitrary file writes.

prevent

Enforces least privilege to ensure high-privileged users lack unnecessary file write capabilities, blocking exploitation of the account creation mechanism.

prevent

Addresses CWE-284 by enforcing access control policies that prevent high-privileged users from performing unauthorized arbitrary file writes via account creation.

MITRE ATT&CK Enterprise TechniquesAI

Insufficient information to map techniques.
Confidence: LOW · MITRE ATT&CK Enterprise v18.1

NVD Description

In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.

Deeper analysisAI

CVE-2025-61879 is a vulnerability in Infoblox NIOS versions through 9.0.7 that allows a high-privileged user to trigger an arbitrary file write via the account creation mechanism. It is rated with a CVSS v3.1 base score of 7.7 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N) and is associated with CWEs-73 (External Control of File Name or Path) and CWE-284 (Improper Access Control). The issue was published on 2026-02-12.

A high-privileged user with network access can exploit this vulnerability through the account creation process, which requires high attack complexity but no user interaction. Successful exploitation enables arbitrary file writes, resulting in high confidentiality and integrity impacts due to the changed scope, though availability is unaffected.

Infoblox advisories provide details on this vulnerability, including CVE-2025-61879 and the related CVE-2025-61880, available at https://infoblox.com and https://support.infoblox.com/s/article/CVE-2025-61879-and-CVE-2025-61880.

Details

CWE(s)

Affected Products

infoblox
nios
8.5.2, 9.0.1, 9.0.2, 9.0.3, 9.0.4 · 8.6.0 — 8.6.5

CVEs Like This One

CVE-2024-37566Same product: Infoblox Nios
CVE-2024-37567Same product: Infoblox Nios
CVE-2024-36046Same product: Infoblox Nios
CVE-2024-36047Same product: Infoblox Nios
CVE-2025-61880Same product: Infoblox Nios
CVE-2026-28442Shared CWE-73
CVE-2025-25950Shared CWE-284
CVE-2026-5786Shared CWE-284
CVE-2025-66254Shared CWE-73
CVE-2026-32768Shared CWE-284

References