Cyber Posture

CVE-2025-67160

HighPublic PoC

Published: 02 January 2026

Published
02 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0025 48.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67160 is a high-severity Path Traversal (CWE-22) vulnerability in Vatilon Pa4 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

Directory traversal directly enables remote exploitation of a public-facing app (T1190) and unauthorized reading of local files/directories (T1005, T1083).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal.

Deeper analysisAI

CVE-2025-67160 is a directory traversal vulnerability (CWE-22) in Vatilon version 1.12.37-20240124. Published on 2026-01-02, it enables attackers to access sensitive directories and files. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its potential for significant confidentiality impact.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows reading of sensitive files and directories, compromising confidentiality without impacting integrity or availability.

Mitigation details and additional information are available in advisories referenced at http://vatilon.com and https://github.com/Remenis/CVE-2025-67160.

Details

CWE(s)

Affected Products

vatilon
pa4 firmware
1.12.37-20240124

CVEs Like This One

CVE-2025-67159Same product: Vatilon Pa4
CVE-2026-30914Shared CWE-22
CVE-2025-60946Shared CWE-22
CVE-2024-57549Shared CWE-22
CVE-2025-2264Shared CWE-22
CVE-2026-6024Shared CWE-22
CVE-2026-22557Shared CWE-22
CVE-2025-52452Shared CWE-22
CVE-2024-57669Shared CWE-22
CVE-2026-25869Shared CWE-22

References