Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62193: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in National Oceanic and Atmospheric Administration (NOAA) Live Access Server (LAS)

0
Critical
VulnerabilityCVE-2025-62193cvecve-2025-62193cwe-78
Published: Thu Jan 15 2026 (01/15/2026, 16:44:15 UTC)
Source: CVE Database V5
Vendor/Project: National Oceanic and Atmospheric Administration (NOAA)
Product: Live Access Server (LAS)

Description

Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code execution via specially crafted requests that include PyFerret expressions. By leveraging a SPAWN command, a remote, unauthenticated attacker can execute arbitrary OS commands. Fixed in a version of 'gov.noaa.pmel.tmap.las.filter.RequestInputFilter.java' from 2025-09-24.

AI-Powered Analysis

AILast updated: 01/15/2026, 17:08:01 UTC

Technical Analysis

CVE-2025-62193 is a critical remote code execution vulnerability identified in version 8 of the NOAA Live Access Server (LAS), a widely used platform for accessing and visualizing environmental and meteorological data. The vulnerability arises from improper neutralization of special elements in OS commands (CWE-78), specifically within the handling of PyFerret expressions. Attackers can craft malicious requests embedding PyFerret SPAWN commands that bypass input validation and execute arbitrary operating system commands without requiring authentication or user interaction. This flaw allows attackers to gain full control over the affected server, potentially leading to data theft, service disruption, or pivoting to internal networks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a prime target for attackers once weaponized. The NOAA LAS is critical infrastructure for many scientific and governmental organizations, making this vulnerability particularly concerning for entities relying on accurate and secure environmental data dissemination. The absence of available patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, access controls, and monitoring for anomalous PyFerret command usage.

Potential Impact

The impact of CVE-2025-62193 on European organizations can be severe, especially for research institutions, meteorological agencies, and governmental bodies that utilize NOAA LAS for environmental data analysis and decision-making. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to compromise the confidentiality of sensitive environmental data, alter or destroy data integrity, and disrupt service availability. This could impair critical scientific research, emergency response coordination, and policy planning reliant on accurate environmental information. Additionally, compromised LAS servers could serve as footholds for lateral movement within networks, potentially exposing other critical infrastructure. The high severity and ease of exploitation without authentication increase the risk of widespread attacks. European organizations involved in climate research, environmental monitoring, and disaster preparedness are particularly vulnerable to operational disruptions and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-62193 effectively, European organizations should: 1) Immediately restrict network access to NOAA LAS servers by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. 2) Monitor network traffic and application logs for unusual PyFerret SPAWN command usage or other anomalous requests indicative of exploitation attempts. 3) Apply vendor patches or updates as soon as they become available; if patches are not yet released, consider temporarily disabling or isolating the LAS service. 4) Implement input validation and sanitization controls at the application layer to prevent injection of malicious commands. 5) Employ host-based intrusion detection systems (HIDS) to detect suspicious OS command executions. 6) Conduct regular security audits and penetration testing focused on the LAS environment. 7) Educate system administrators and security teams about the specific nature of this vulnerability to improve incident response readiness. 8) Consider deploying Web Application Firewalls (WAF) with custom rules to block malicious PyFerret expressions. These measures, combined, will reduce the attack surface and improve detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-10-08T17:10:06.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69691b9253752d4047972530

Added to database: 1/15/2026, 4:53:38 PM

Last enriched: 1/15/2026, 5:08:01 PM

Last updated: 1/15/2026, 9:30:35 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats