Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62691: Stack-based buffer overflow in Intercom, Inc. Security Point (Windows) of MaLion

0
Critical
VulnerabilityCVE-2025-62691cvecve-2025-62691
Published: Tue Nov 25 2025 (11/25/2025, 07:21:02 UTC)
Source: CVE Database V5
Vendor/Project: Intercom, Inc.
Product: Security Point (Windows) of MaLion

Description

Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

AI-Powered Analysis

AILast updated: 11/25/2025, 07:43:56 UTC

Technical Analysis

CVE-2025-62691 is a stack-based buffer overflow vulnerability identified in the Security Point (Windows) component of MaLion, a product by Intercom, Inc. The vulnerability exists in the way HTTP headers are processed, where a specially crafted HTTP request can overflow a stack buffer. This overflow allows an unauthenticated remote attacker to execute arbitrary code with SYSTEM-level privileges, effectively granting full control over the affected system. The vulnerability affects all versions prior to 7.1.1.9. The flaw requires no authentication or user interaction and can be exploited remotely over the network, increasing its severity and ease of exploitation. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The vulnerability could be leveraged to compromise enterprise environments, steal sensitive data, disrupt services, or establish persistent footholds. The lack of patches at the time of disclosure necessitates urgent remediation. The vulnerability's presence in a security product that may be deployed in sensitive environments further exacerbates the risk, as compromise could undermine broader organizational security postures.

Potential Impact

For European organizations, the impact of CVE-2025-62691 is substantial. Exploitation leads to full SYSTEM-level code execution, enabling attackers to bypass security controls, access sensitive data, disrupt services, or deploy ransomware and other malware. Organizations in critical infrastructure sectors such as energy, finance, healthcare, and government are particularly vulnerable due to their reliance on robust security solutions like MaLion Security Point. A successful attack could result in data breaches, operational downtime, regulatory penalties under GDPR, and reputational damage. The remote, unauthenticated nature of the exploit increases the likelihood of widespread attacks, potentially affecting large numbers of endpoints. Given the product’s role in security, compromise could also facilitate lateral movement and further network penetration, amplifying the overall impact. The absence of known exploits currently provides a window for proactive defense, but the risk of rapid exploitation once public exploit code emerges remains high.

Mitigation Recommendations

1. Immediately upgrade all affected installations of Security Point (Windows) of MaLion to version 7.1.1.9 or later, where the vulnerability is patched. 2. Implement network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) configured to detect and block malformed HTTP headers or suspicious HTTP requests targeting the affected service. 3. Conduct thorough vulnerability scanning and asset inventory to identify all instances of the vulnerable product within the network. 4. Apply strict network segmentation to isolate critical security infrastructure from general user networks and the internet. 5. Monitor logs and network traffic for anomalous HTTP header patterns or unexpected requests to the Security Point service. 6. Employ endpoint detection and response (EDR) solutions to detect and respond to suspicious process behaviors indicative of exploitation attempts. 7. Develop and test incident response plans specific to potential exploitation scenarios involving this vulnerability. 8. Educate IT and security teams about the vulnerability’s characteristics and exploitation methods to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-18T02:02:13.827Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69255ab1292ce6fc00b965ab

Added to database: 11/25/2025, 7:28:49 AM

Last enriched: 11/25/2025, 7:43:56 AM

Last updated: 11/25/2025, 9:18:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats