CVE-2025-4905: Deserialization in iop-apl-uw basestation3
A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.
AI Analysis
Technical Summary
CVE-2025-4905 is a medium-severity vulnerability affecting the iop-apl-uw basestation3 software versions 3.0.0 through 3.0.4. The vulnerability arises from insecure deserialization in the load_qc_pickl function located in the basestation3/QC.py file. Specifically, the vulnerability is triggered by manipulation of the qc_file argument, which is deserialized without sufficient validation or sanitization. This can allow an attacker with local access and low privileges to execute arbitrary code or manipulate the application state by crafting malicious serialized data. The vulnerability requires local access (AV:L) and low privileges (PR:L), but does not require user interaction (UI:N). The attack complexity is low (AC:L), and the impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L). The vendor has marked the issue as closed; however, no patch or updated release has been published yet, leaving affected users exposed. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. The vulnerability does not require network access or authentication beyond local access, which limits its attack surface but still poses a risk in environments where local access can be obtained or where multiple users share the system. The deserialization flaw is a common vector for remote code execution or privilege escalation if combined with other vulnerabilities or misconfigurations, making timely mitigation important.
Potential Impact
For European organizations using iop-apl-uw basestation3, this vulnerability could lead to unauthorized code execution or data manipulation if an attacker gains local access to the system. This could compromise the confidentiality and integrity of sensitive data processed by the basestation3 software. Although the vulnerability requires local access, in environments such as shared workstations, multi-user systems, or where attackers have physical or remote access through other means (e.g., compromised credentials or lateral movement), the risk is significant. The impact could include disruption of operations, data corruption, or further escalation of privileges leading to broader network compromise. Given the lack of an official patch, organizations face a window of exposure. In critical infrastructure or industrial control systems in Europe that rely on basestation3, this vulnerability could affect operational continuity and safety. The medium CVSS score reflects moderate risk but should not be underestimated in sensitive environments.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local access to systems running basestation3 to trusted personnel only, enforcing strict access controls and monitoring. 2) Employ application whitelisting and runtime application self-protection (RASP) to detect and block unauthorized deserialization attempts. 3) Isolate basestation3 instances in segmented network zones to limit lateral movement if compromise occurs. 4) Monitor system logs and basestation3 application logs for unusual deserialization or file access patterns related to qc_file usage. 5) Until an official patch is released, consider disabling or restricting functionality that involves loading qc_file inputs if feasible. 6) Use host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation attempts. 7) Maintain up-to-date backups and incident response plans tailored to basestation3 environments. 8) Engage with the vendor or community to obtain updates or unofficial patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-4905: Deserialization in iop-apl-uw basestation3
Description
A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.
AI-Powered Analysis
Technical Analysis
CVE-2025-4905 is a medium-severity vulnerability affecting the iop-apl-uw basestation3 software versions 3.0.0 through 3.0.4. The vulnerability arises from insecure deserialization in the load_qc_pickl function located in the basestation3/QC.py file. Specifically, the vulnerability is triggered by manipulation of the qc_file argument, which is deserialized without sufficient validation or sanitization. This can allow an attacker with local access and low privileges to execute arbitrary code or manipulate the application state by crafting malicious serialized data. The vulnerability requires local access (AV:L) and low privileges (PR:L), but does not require user interaction (UI:N). The attack complexity is low (AC:L), and the impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L). The vendor has marked the issue as closed; however, no patch or updated release has been published yet, leaving affected users exposed. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. The vulnerability does not require network access or authentication beyond local access, which limits its attack surface but still poses a risk in environments where local access can be obtained or where multiple users share the system. The deserialization flaw is a common vector for remote code execution or privilege escalation if combined with other vulnerabilities or misconfigurations, making timely mitigation important.
Potential Impact
For European organizations using iop-apl-uw basestation3, this vulnerability could lead to unauthorized code execution or data manipulation if an attacker gains local access to the system. This could compromise the confidentiality and integrity of sensitive data processed by the basestation3 software. Although the vulnerability requires local access, in environments such as shared workstations, multi-user systems, or where attackers have physical or remote access through other means (e.g., compromised credentials or lateral movement), the risk is significant. The impact could include disruption of operations, data corruption, or further escalation of privileges leading to broader network compromise. Given the lack of an official patch, organizations face a window of exposure. In critical infrastructure or industrial control systems in Europe that rely on basestation3, this vulnerability could affect operational continuity and safety. The medium CVSS score reflects moderate risk but should not be underestimated in sensitive environments.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local access to systems running basestation3 to trusted personnel only, enforcing strict access controls and monitoring. 2) Employ application whitelisting and runtime application self-protection (RASP) to detect and block unauthorized deserialization attempts. 3) Isolate basestation3 instances in segmented network zones to limit lateral movement if compromise occurs. 4) Monitor system logs and basestation3 application logs for unusual deserialization or file access patterns related to qc_file usage. 5) Until an official patch is released, consider disabling or restricting functionality that involves loading qc_file inputs if feasible. 6) Use host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation attempts. 7) Maintain up-to-date backups and incident response plans tailored to basestation3 environments. 8) Engage with the vendor or community to obtain updates or unofficial patches and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-17T13:14:07.574Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb827
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:46:42 PM
Last updated: 11/20/2025, 2:54:37 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
MediumCVE-2025-13445: Stack-based Buffer Overflow in Tenda AC21
HighCVE-2025-13443: Improper Access Controls in macrozheng mall
MediumCVE-2025-13442: Command Injection in UTT 进取 750W
MediumCVE-2025-13435: Path Traversal in Dreampie Resty
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.