Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0645: CWE-434 Unrestricted Upload of File with Dangerous Type in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage

0
High
VulnerabilityCVE-2025-0645cvecve-2025-0645cwe-434
Published: Thu Nov 20 2025 (11/20/2025, 13:33:38 UTC)
Source: CVE Database V5
Vendor/Project: Narkom Communication and Software Technologies Trade Ltd. Co.
Product: Pyxis Signage

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Pyxis Signage: through 31012025.

AI-Powered Analysis

AILast updated: 11/27/2025, 14:46:57 UTC

Technical Analysis

CVE-2025-0645 is a vulnerability classified under CWE-434, indicating an unrestricted upload of files with dangerous types in the Pyxis Signage product developed by Narkom Communication and Software Technologies Trade Ltd. Co. The flaw allows an attacker who already has high-level privileges (PR:H) to bypass access control lists (ACLs) and upload malicious files remotely (AV:N) without requiring user interaction (UI:N). The vulnerability affects all versions up to 31 January 2025 and has a CVSS v3.1 base score of 7.2, reflecting high severity. The core issue is that the application does not properly restrict the types of files that can be uploaded, enabling an attacker to place executable or otherwise harmful files on the system. This can lead to full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers may execute arbitrary code, manipulate signage content, or disrupt service. Although no public exploits are known yet, the vulnerability's nature and ease of exploitation by privileged users make it a significant risk. The lack of patches at the time of reporting necessitates immediate mitigation through access control hardening and monitoring.

Potential Impact

For European organizations, especially those using Pyxis Signage in critical environments such as transportation hubs, retail chains, or public information systems, this vulnerability poses a serious risk. Exploitation could lead to unauthorized code execution, data leakage, defacement of digital signage content, or denial of service, potentially disrupting operations and damaging reputation. Given the high confidentiality, integrity, and availability impact, attackers could leverage this flaw to pivot into broader network compromise or sabotage. The requirement for high privileges means insider threats or compromised administrative accounts are the most likely vectors. However, once exploited, the consequences could affect large user bases and critical infrastructure, making it a priority for security teams in Europe to address.

Mitigation Recommendations

Organizations should immediately review and tighten access controls to ensure that only fully trusted administrators have upload privileges in Pyxis Signage. Network segmentation should isolate signage systems from critical infrastructure to limit lateral movement. Implement application-layer filtering or web application firewalls (WAFs) to detect and block suspicious file uploads. Monitor logs for unusual upload activity or attempts to upload executable file types. Employ file integrity monitoring on signage servers to detect unauthorized changes. Until an official patch is released, consider disabling file upload functionality if feasible or restricting it to safe file types through custom validation. Conduct regular audits of user privileges and enforce strong authentication mechanisms for administrative access. Finally, prepare for rapid deployment of patches once available from the vendor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-01-22T13:58:50.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f1de63e6177767e7f6c6e

Added to database: 11/20/2025, 1:55:50 PM

Last enriched: 11/27/2025, 2:46:57 PM

Last updated: 1/7/2026, 4:53:43 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats