Skip to main content

CVE-2025-47771: CWE-502: Deserialization of Untrusted Data in powsybl powsybl-core

High
VulnerabilityCVE-2025-47771cvecve-2025-47771cwe-502
Published: Thu Jun 19 2025 (06/19/2025, 23:41:41 UTC)
Source: CVE Database V5
Vendor/Project: powsybl
Product: powsybl-core

Description

PowSyBl (Power System Blocks) is a framework to build power system oriented software. In versions 6.3.0 to 6.7.1, there is a deserialization issue in the read method of the SparseMatrix class that can lead to a wide range of privilege escalations depending on the circumstances. This method takes in an InputStream and returns a SparseMatrix object. This issue has been patched in com.powsybl:powsybl-math: 6.7.2. A workaround for this issue involves not using SparseMatrix deserialization (SparseMatrix.read(...) methods).

AI-Powered Analysis

AILast updated: 06/20/2025, 00:01:47 UTC

Technical Analysis

CVE-2025-47771 is a high-severity vulnerability affecting the PowSyBl framework, specifically versions 6.3.0 through 6.7.1 of the powsybl-core component. PowSyBl is an open-source framework designed for building power system software, widely used in electrical grid modeling and simulation. The vulnerability stems from unsafe deserialization in the SparseMatrix class's read method, which accepts an InputStream and returns a SparseMatrix object. Deserialization of untrusted data is a well-known security risk (CWE-502) because it can allow attackers to craft malicious input streams that, when deserialized, execute arbitrary code or escalate privileges. In this case, the vulnerability can lead to a broad range of privilege escalations depending on the environment and usage context, without requiring authentication or user interaction. The flaw is exploitable remotely (network vector) with low complexity and no privileges required, making it highly accessible to attackers. The vulnerability has been patched in version 6.7.2 of the powsybl-math library. As a workaround, users are advised to avoid using the SparseMatrix.read(...) deserialization methods until they can upgrade. No known exploits have been reported in the wild yet, but the high CVSS 4.0 score of 8.1 reflects the significant risk posed by this vulnerability. Given that PowSyBl is specialized software used in power system management and simulation, exploitation could compromise the confidentiality, integrity, and availability of critical power grid data and control systems, potentially leading to operational disruptions or unauthorized control over power infrastructure components.

Potential Impact

For European organizations, especially those involved in power generation, transmission, distribution, and grid management, this vulnerability poses a serious threat. Successful exploitation could allow attackers to escalate privileges within systems managing critical infrastructure, potentially leading to unauthorized manipulation of power system models or operational data. This could result in incorrect grid simulations, misinformed operational decisions, or even direct interference with control systems if integrated with other infrastructure components. The impact extends to national grid operators, energy utilities, and software vendors providing power system solutions. Disruption or manipulation of power system software can have cascading effects on energy availability, grid stability, and economic activities reliant on continuous power supply. Furthermore, given the increasing digitization and interconnectivity of European power grids, a compromise in one system could facilitate lateral movement to other critical infrastructure components. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts, raising urgency for affected organizations to act promptly.

Mitigation Recommendations

1. Immediate upgrade to powsybl-math version 6.7.2 or later, which contains the patch for this vulnerability, is the most effective mitigation. 2. Until an upgrade is possible, disable or avoid using the SparseMatrix.read(...) deserialization methods entirely to prevent exposure to untrusted input streams. 3. Implement strict input validation and sanitization on any data streams fed into the SparseMatrix deserialization process to reduce risk. 4. Employ network segmentation and strict access controls around systems running PowSyBl to limit exposure to untrusted networks and reduce attack surface. 5. Monitor logs and network traffic for unusual deserialization attempts or malformed input streams targeting the SparseMatrix class. 6. Conduct thorough security assessments and penetration testing focused on deserialization vectors within power system software environments. 7. Establish incident response plans specifically addressing potential compromises of power system modeling tools to enable rapid containment and recovery. 8. Collaborate with vendors and industry groups to share threat intelligence and best practices related to PowSyBl and similar frameworks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-09T19:49:35.619Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6854a16d7ff74dad36a08d51

Added to database: 6/19/2025, 11:46:53 PM

Last enriched: 6/20/2025, 12:01:47 AM

Last updated: 8/11/2025, 2:33:08 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats