Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62290: Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in takeover of Oracle ZFS Storage Appliance Kit. in Oracle Corporation Oracle ZFS Storage Appliance Kit

0
High
VulnerabilityCVE-2025-62290cvecve-2025-62290
Published: Tue Oct 21 2025 (10/21/2025, 20:03:16 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle ZFS Storage Appliance Kit

Description

Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Block Storage). The supported version that is affected is 8.8. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in takeover of Oracle ZFS Storage Appliance Kit. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

AI-Powered Analysis

AILast updated: 10/28/2025, 20:29:48 UTC

Technical Analysis

CVE-2025-62290 is a vulnerability identified in Oracle ZFS Storage Appliance Kit version 8.8, specifically within the block storage component. The flaw stems from improper access control (CWE-284), allowing an attacker who already possesses high privileges and network access via HTTP to fully compromise the appliance. The vulnerability does not require user interaction and can be exploited remotely over the network, making it a significant risk in environments where the appliance is exposed or accessible internally by potentially malicious actors. Successful exploitation can lead to complete takeover of the storage appliance, impacting confidentiality, integrity, and availability of stored data and services relying on the appliance. The CVSS 3.1 base score of 7.2 reflects a high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits are known at this time, the ease of exploitation given the low complexity and network accessibility, combined with the critical nature of storage appliances in enterprise environments, underscores the urgency of addressing this vulnerability. The lack of available patches at the time of disclosure necessitates immediate compensating controls to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2025-62290 is significant due to the critical role Oracle ZFS Storage Appliances play in enterprise storage infrastructure, including data centers, cloud providers, and large-scale IT environments. A successful attack could lead to unauthorized data access, data corruption, or complete service outages, affecting business continuity and compliance with data protection regulations such as GDPR. The compromise of storage appliances could also facilitate lateral movement within networks, increasing the risk of broader breaches. Industries such as finance, telecommunications, healthcare, and government agencies in Europe, which rely heavily on secure and reliable storage solutions, would face heightened risks of data loss, reputational damage, and regulatory penalties. The network-based attack vector means that any exposed or inadequately segmented Oracle ZFS appliances are vulnerable, emphasizing the need for stringent network security controls.

Mitigation Recommendations

1. Immediately restrict network access to Oracle ZFS Storage Appliance management interfaces, limiting exposure to trusted administrative networks only. 2. Implement strict network segmentation and firewall rules to isolate storage appliances from general user networks and the internet. 3. Enforce strong authentication and access control policies to ensure only authorized high-privileged users can access the appliance. 4. Monitor network traffic and appliance logs for unusual or unauthorized access attempts, focusing on HTTP-based management interfaces. 5. Prepare for rapid deployment of official patches or updates from Oracle once released; subscribe to Oracle security advisories for timely notifications. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting Oracle ZFS appliances. 7. Conduct regular security audits and vulnerability assessments on storage infrastructure to identify and remediate potential weaknesses. 8. Develop and test incident response plans specific to storage appliance compromises to minimize downtime and data loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-10-09T23:08:43.178Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97201721c03c6f13f03

Added to database: 10/21/2025, 8:13:38 PM

Last enriched: 10/28/2025, 8:29:48 PM

Last updated: 10/29/2025, 7:03:12 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats