Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54964: n/a

0
High
VulnerabilityCVE-2025-54964cvecve-2025-54964
Published: Thu Oct 23 2025 (10/23/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in BAE SOCET GXP before 4.6.0.2. An attacker with the ability to interact with the GXP Job Service may inject arbitrary executables. If the Job Service is configured for local-only access, this may allow for privilege escalation in certain situations. If the Job Service is network accessible, this may allow remote command execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:36:02 UTC

Technical Analysis

CVE-2025-54964 is a critical command injection vulnerability affecting BAE SOCET GXP software versions prior to 4.6.0.2. The flaw exists in the GXP Job Service component, which processes job requests potentially containing malicious input. An attacker with the ability to interact with this service can inject arbitrary executables, exploiting insufficient input validation and command sanitization (classified under CWE-77). When the Job Service is configured for local-only access, the vulnerability can be leveraged for privilege escalation, allowing an attacker with limited local access to gain elevated privileges. More critically, if the Job Service is exposed on a network interface, the vulnerability enables unauthenticated remote command execution, allowing attackers to run arbitrary code remotely without user interaction. This broadens the attack surface significantly, as no authentication or user action is required. The vulnerability impacts confidentiality, integrity, and availability of affected systems, as attackers can execute arbitrary commands, potentially leading to data theft, system compromise, or denial of service. Although no public exploits have been reported yet, the high CVSS score (8.4) reflects the ease of exploitation and severe impact. The vulnerability was reserved in August 2025 and published in October 2025, indicating recent discovery. No official patches are listed yet, so mitigation relies on restricting access and monitoring. The affected software is widely used in geospatial intelligence and defense sectors, making it a high-value target for nation-state and advanced threat actors.

Potential Impact

The impact of CVE-2025-54964 is substantial for organizations using BAE SOCET GXP, particularly in defense, intelligence, and geospatial analysis sectors. Successful exploitation can lead to full system compromise via remote code execution if the Job Service is network accessible, enabling attackers to execute arbitrary commands with the privileges of the service. This can result in unauthorized data access, manipulation, or destruction, severely compromising confidentiality and integrity. Privilege escalation on local-only configurations can allow attackers to gain administrative control, facilitating further lateral movement and persistence. The availability of critical systems may also be affected if attackers disrupt or disable services. Given the sensitive nature of data processed by SOCET GXP, including classified geospatial intelligence, the consequences could extend to national security risks, espionage, and operational disruptions. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks once the vulnerability is known. Organizations worldwide relying on this software face significant operational and reputational risks if unmitigated.

Mitigation Recommendations

1. Immediately restrict access to the GXP Job Service to trusted, internal networks only, using network segmentation and firewall rules to block external access. 2. Monitor network traffic and system logs for unusual activity related to the Job Service, including unexpected executable launches or command patterns. 3. Apply the official patch from BAE Systems as soon as it becomes available; coordinate with vendor support for early access or workarounds. 4. If patching is delayed, consider disabling the Job Service temporarily if operationally feasible to eliminate the attack surface. 5. Implement application whitelisting on hosts running SOCET GXP to prevent unauthorized executables from running. 6. Employ endpoint detection and response (EDR) solutions to detect and respond to suspicious process executions. 7. Conduct regular vulnerability assessments and penetration testing focusing on the Job Service exposure. 8. Educate system administrators about the risks of exposing internal services and the importance of strict access controls. 9. Use host-based firewalls and access control lists to limit which users and processes can interact with the Job Service. 10. Maintain an incident response plan tailored to potential exploitation scenarios involving SOCET GXP.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fa8ab1326f59cb11e62869

Added to database: 10/23/2025, 8:06:09 PM

Last enriched: 2/27/2026, 5:36:02 AM

Last updated: 3/21/2026, 5:04:02 PM

Views: 211

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses