Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0645: CWE-434 Unrestricted Upload of File with Dangerous Type in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage

0
High
VulnerabilityCVE-2025-0645cvecve-2025-0645cwe-434
Published: Thu Nov 20 2025 (11/20/2025, 13:33:38 UTC)
Source: CVE Database V5
Vendor/Project: Narkom Communication and Software Technologies Trade Ltd. Co.
Product: Pyxis Signage

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Pyxis Signage: through 31012025.

AI-Powered Analysis

AILast updated: 11/20/2025, 14:10:33 UTC

Technical Analysis

CVE-2025-0645 is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability exists in the Pyxis Signage product developed by Narkom Communication and Software Technologies Trade Ltd. Co. The core issue is that the application does not properly constrain file uploads through access control mechanisms, allowing an authenticated user with high privileges to upload files that could be malicious, such as executable scripts or binaries. The vulnerability is network exploitable (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as attackers could execute arbitrary code, manipulate signage content, or disrupt services. The vulnerability affects all versions of Pyxis Signage up to 31 January 2025. No patches or exploits are currently documented, but the risk remains significant due to the nature of the flaw and the criticality of the impacted systems, which are often used in public or enterprise environments for digital signage and information dissemination.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized code execution on signage systems, data breaches, and service disruptions. Since digital signage often interfaces with public-facing networks and internal systems, attackers could leverage this flaw to pivot into broader enterprise networks, compromising sensitive information or causing reputational damage. Critical infrastructure, retail environments, transportation hubs, and corporate campuses using Pyxis Signage are particularly vulnerable. The high confidentiality, integrity, and availability impact means attackers could manipulate displayed content to spread misinformation or malware, disrupt operations, or exfiltrate data. The requirement for high privileges limits the attack vector to insiders or compromised accounts, but once exploited, the damage potential is extensive. This could also affect compliance with European data protection regulations if personal or sensitive data is exposed or manipulated.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict user privileges to minimize the number of accounts with high-level access capable of uploading files. 2) Implement strict file type validation and filtering on the upload functionality to block dangerous file types such as executables, scripts, or other potentially harmful formats. 3) Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts. 4) Monitor logs and network traffic for unusual upload activity or attempts to bypass ACLs. 5) Isolate Pyxis Signage systems from critical internal networks to limit lateral movement in case of compromise. 6) Engage with the vendor for patches or updates as soon as they become available and apply them promptly. 7) Conduct regular security assessments and penetration tests focusing on file upload mechanisms. 8) Educate administrators on secure configuration and the risks associated with file upload vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-01-22T13:58:50.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f1de63e6177767e7f6c6e

Added to database: 11/20/2025, 1:55:50 PM

Last enriched: 11/20/2025, 2:10:33 PM

Last updated: 11/20/2025, 8:25:26 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats