Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11546: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NEC Corporation CLUSTERPRO X for Linux (EXPRESSCLUSTER X for Linux)

0
Critical
VulnerabilityCVE-2025-11546cvecve-2025-11546cwe-78
Published: Fri Nov 07 2025 (11/07/2025, 01:09:08 UTC)
Source: CVE Database V5
Vendor/Project: NEC Corporation
Product: CLUSTERPRO X for Linux (EXPRESSCLUSTER X for Linux)

Description

CLUSTERPRO X for Linux 4.0, 4.1, 4.2, 5.0, 5.1 and 5.2 and EXPRESSCLUSTER X for Linux 4.0, 4.1, 4.2, 5.0, 5.1 and 5.2, CLUSTERPRO X SingleServerSafe for Linux 4.0, 4.1, 4.2, 5.0, 5.1 and 5.2, EXPRESSCLUSTER X SingleServerSafe for Linux 4.0, 4.1, 4.2, 5.0, 5.1 and 5.2 allows an attacker sends specially crafted network packets to the product, arbitrary OS commands may be executed without authentication.

AI-Powered Analysis

AILast updated: 11/14/2025, 02:26:00 UTC

Technical Analysis

CVE-2025-11546 is an OS command injection vulnerability classified under CWE-78, affecting multiple versions (4.0 to 5.2) of NEC Corporation's CLUSTERPRO X for Linux and EXPRESSCLUSTER X for Linux, including SingleServerSafe variants. The vulnerability arises from improper neutralization of special elements in network packets processed by the cluster management software, allowing an attacker to inject and execute arbitrary operating system commands remotely. Notably, exploitation requires no authentication or user interaction, and the attack vector is network-based, making it highly accessible to remote adversaries. The affected products are designed for high availability and clustering in Linux environments, commonly deployed in enterprise and critical infrastructure settings. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, with a vector indicating network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). Although no exploits have been observed in the wild yet, the ease of exploitation and potential for complete system compromise make this a severe threat. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor for suspicious network activity targeting these products.

Potential Impact

The impact of CVE-2025-11546 on European organizations is substantial, particularly for those relying on NEC's cluster management solutions for critical systems. Successful exploitation allows remote attackers to execute arbitrary OS commands without authentication, potentially leading to full system compromise, data breaches, service disruption, and lateral movement within networks. This can severely affect confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by disrupting cluster operations or causing denial of service. Given the role of clustering software in ensuring high availability, attacks could result in significant downtime for essential services, impacting sectors such as finance, telecommunications, manufacturing, and government operations. The vulnerability's network-based attack vector and lack of required privileges increase the risk of widespread exploitation if left unmitigated. European organizations with regulatory obligations around data protection and operational resilience may face compliance and reputational consequences following an incident involving this vulnerability.

Mitigation Recommendations

Until official patches are released by NEC Corporation, European organizations should implement several targeted mitigations. First, restrict network access to the affected cluster management interfaces by applying strict firewall rules and network segmentation to limit exposure only to trusted management hosts. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify suspicious packets targeting CLUSTERPRO X and EXPRESSCLUSTER X protocols. Conduct thorough logging and monitoring of network traffic and system commands on affected servers to detect potential exploitation attempts early. Disable or isolate unused cluster management services where feasible to reduce the attack surface. Engage with NEC support channels to obtain early patch notifications and apply updates promptly once available. Additionally, conduct internal audits to identify all instances of the affected software versions within the environment to prioritize remediation efforts. Educate system administrators on the risks and signs of exploitation to enhance incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NEC
Date Reserved
2025-10-09T06:48:19.068Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d500c6b26dbd672d3921f

Added to database: 11/7/2025, 1:49:00 AM

Last enriched: 11/14/2025, 2:26:00 AM

Last updated: 12/22/2025, 7:53:52 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats