Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13706: CWE-502: Deserialization of Untrusted Data in Tencent PatrickStar

0
High
VulnerabilityCVE-2025-13706cvecve-2025-13706cwe-502
Published: Tue Dec 23 2025 (12/23/2025, 21:34:00 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: PatrickStar

Description

Tencent PatrickStar merge_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent PatrickStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the merge_checkpoint endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27182.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:58:56 UTC

Technical Analysis

CVE-2025-13706 is a critical vulnerability identified in Tencent PatrickStar version 0.4.6, specifically within the merge_checkpoint endpoint. The vulnerability stems from CWE-502: Deserialization of Untrusted Data, where the application fails to properly validate user-supplied input before deserializing it. This flaw enables an attacker to craft malicious serialized objects that, when processed by the vulnerable endpoint, lead to arbitrary code execution on the host system. The exploit requires user interaction, such as the target visiting a malicious webpage or opening a malicious file, which triggers the deserialization process. Successful exploitation grants the attacker root-level privileges, allowing full control over the affected system. The vulnerability was assigned a CVSS 3.0 base score of 7.8, indicating high severity with significant impacts on confidentiality, integrity, and availability. No public exploits have been reported yet, but the nature of the vulnerability and root-level access potential make it a critical threat. Tencent has not yet published a patch, so organizations must rely on mitigation strategies until an official fix is available. The vulnerability was reported by ZDI under identifier ZDI-CAN-27182 and publicly disclosed on December 23, 2025.

Potential Impact

For European organizations, the impact of CVE-2025-13706 can be severe. Given that exploitation leads to remote code execution with root privileges, attackers could gain complete control over affected systems, potentially leading to data breaches, service disruption, and lateral movement within networks. Confidentiality is at high risk as sensitive data could be exfiltrated. Integrity could be compromised through unauthorized modifications or insertion of malicious code. Availability may also be affected if attackers deploy ransomware or disrupt critical services. Organizations relying on Tencent PatrickStar for data processing or infrastructure management could face operational downtime and reputational damage. The requirement for user interaction somewhat limits exploitation scope but does not eliminate risk, especially in environments where users may be targeted with phishing or social engineering. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks, especially as threat actors reverse-engineer the vulnerability. European entities in sectors such as finance, telecommunications, and critical infrastructure are particularly vulnerable due to the potential impact on essential services and sensitive data.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the merge_checkpoint endpoint to trusted users and networks only, using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all user-supplied data to prevent malicious serialized objects from being processed. 3. Employ application-layer security controls such as Web Application Firewalls (WAFs) configured to detect and block suspicious deserialization patterns. 4. Educate users to recognize and avoid phishing attempts or malicious files that could trigger exploitation. 5. Monitor logs and network traffic for unusual activity related to the merge_checkpoint endpoint, including unexpected deserialization attempts or privilege escalations. 6. Maintain up-to-date backups and develop an incident response plan tailored to potential ransomware or data breach scenarios. 7. Coordinate with Tencent for timely patch deployment once available and test patches in controlled environments before production rollout. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and prevent exploitation attempts in real time. 9. Limit privileges of services running PatrickStar where feasible to reduce impact of potential compromise. 10. Conduct regular security assessments and penetration testing focusing on deserialization vulnerabilities and endpoint security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-11-25T21:52:30.090Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0d93d69af40f312d385e

Added to database: 12/23/2025, 9:45:55 PM

Last enriched: 12/30/2025, 11:58:56 PM

Last updated: 2/5/2026, 2:29:17 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats