CVE-2025-64123
Published: 02 January 2026
Summary
CVE-2025-64123 is a critical-severity Confused Deputy (CWE-441) vulnerability in Nuvationenergy Nplatform. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Boundary Bridging (T1599); ranked at the 23.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Boundary protection monitors and controls communications at network boundaries, directly preventing the unintended proxying and network boundary bridging allowed by CVE-2025-64123 in the MSC.
Information flow enforcement restricts unauthorized data flows between networks, mitigating the proxy vulnerability that enables boundary bridging in affected MSC deployments.
Flaw remediation requires timely patching of the specific unintended proxy vulnerability in Nuvation Energy MSC through release 2.5.1, eliminating the root cause of network boundary bridging.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Explicitly described as enabling Network Boundary Bridging via unintended proxy/intermediary behavior (CWE-441), directly matching T1599.
NVD Description
Unintended Proxy or Intermediary vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows Network Boundary Bridging.This issue affects Multi-Stack Controller (MSC): through and including release 2.5.1.
Deeper analysisAI
CVE-2025-64123 is an Unintended Proxy or Intermediary vulnerability (CWE-441) in the Nuvation Energy Multi-Stack Controller (MSC) that allows Network Boundary Bridging. This issue affects the MSC through and including release 2.5.1. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-02.
Attackers can exploit this vulnerability remotely over the network with low complexity, requiring no privileges or user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling attackers to bridge network boundaries in affected MSC deployments.
Advisories related to this vulnerability are available at https://www.dragos.com/community/advisories/CVE-2025-64119.
Details
- CWE(s)