Cyber Posture

CVE-2025-64128

CriticalRCE

Published: 26 November 2025

Published
26 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0832 92.4th percentile
Risk Priority 25 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-64128 is a critical-severity OS Command Injection (CWE-78) vulnerability in Zenitel (inferred from references). Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied inputs to prevent OS command injection due to incomplete formatting rules.

prevent

Enforces input restrictions including validation and rejection of invalid inputs, mitigating injection of arbitrary data.

prevent

Remediates the specific flaw in firmware validation, addressing exploitation of this CVE via patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote OS command injection in network-facing firmware enables T1190 (Exploit Public-Facing Application) and directly facilitates arbitrary Unix shell command execution via T1059.004.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

Deeper analysisAI

CVE-2025-64128 is an OS command injection vulnerability (CWE-78) due to incomplete validation of user-supplied input in the Zenitel Station and Device Firmware Package (VS-IS). Insufficient formatting rules in the validation process allow attackers to append arbitrary data, enabling the injection of arbitrary OS commands. The vulnerability was published on 2025-11-26 and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges or user interaction. Exploitation allows injection of arbitrary commands, potentially resulting in high impacts to confidentiality, integrity, and availability with a changed scope.

Mitigation details are provided in official advisories, including CISA ICS Advisory ICSA-25-329-03 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-329-03, the Zenitel wiki downloads page for Station and Device Firmware Package (VS-IS) at https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29, and the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-329-03.json.

Details

CWE(s)

Affected Products

Zenitel
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-1961Shared CWE-78
CVE-2025-54418Shared CWE-78
CVE-2025-20349Shared CWE-78
CVE-2026-4802Shared CWE-78
CVE-2026-25857Shared CWE-78
CVE-2025-27364Shared CWE-78
CVE-2025-7382Shared CWE-78
CVE-2026-42364Shared CWE-78
CVE-2021-47794Shared CWE-78
CVE-2026-34791Shared CWE-78

References