CVE-2025-64093: Vulnerability in Zenitel ICX500
Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.
AI Analysis
Technical Summary
CVE-2025-64093 is a remote code execution (RCE) vulnerability identified in the Zenitel ICX500 intercom system, specifically affecting firmware versions earlier than 1.4.3.3. The vulnerability arises from improper input validation in the hostname configuration parameter, allowing unauthenticated attackers to inject arbitrary commands. Because the hostname field is processed by the system without sufficient sanitization, attackers can craft malicious payloads that execute arbitrary code with system-level privileges. This flaw requires no authentication or user interaction, making it trivially exploitable over the network by any attacker who can reach the device. The vulnerability's CVSS 3.1 base score is 10.0, reflecting its critical nature with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially compromising the entire device. Although no public exploits have been reported yet, the severity and ease of exploitation make this a high-priority issue. The ICX500 is commonly deployed in enterprise and public safety environments for secure communication, meaning exploitation could lead to unauthorized access, data leakage, service disruption, or pivoting into internal networks. The vulnerability was reserved on 2025-10-27 and published on 2026-01-09 by NCSC-NL, indicating coordinated disclosure. No official patches or mitigation links are currently provided, emphasizing the need for vigilance and interim protective measures.
Potential Impact
For European organizations, the impact of CVE-2025-64093 is substantial. The Zenitel ICX500 is widely used in critical infrastructure sectors such as transportation, public safety, and industrial facilities across Europe. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, disrupt communication services, exfiltrate sensitive information, or use the device as a foothold for lateral movement within corporate or governmental networks. This could result in operational downtime, loss of sensitive data, reputational damage, and potential safety hazards if emergency communication systems are affected. Given the device’s role in secure communications, the confidentiality and integrity of communications could be severely undermined. The vulnerability’s unauthenticated nature and network accessibility increase the risk of widespread exploitation, especially in environments where ICX500 devices are internet-facing or insufficiently segmented. The lack of current patches means organizations must rely on compensating controls to reduce exposure until updates are available.
Mitigation Recommendations
1. Immediately identify all Zenitel ICX500 devices in your network and verify their firmware versions. 2. Apply the official firmware update to version 1.4.3.3 or later as soon as it becomes available from Zenitel. 3. Until patches are deployed, restrict network access to ICX500 devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted networks, including the internet. 4. Disable any unnecessary services or management interfaces on the ICX500 devices to reduce the attack surface. 5. Monitor network traffic and device logs for unusual hostname changes or command injection attempts, using intrusion detection systems tuned for this vulnerability. 6. Employ network-level anomaly detection to identify exploitation attempts targeting the hostname parameter. 7. Conduct regular vulnerability scans and penetration tests focusing on ICX500 devices to ensure no residual exposure. 8. Establish an incident response plan specific to this vulnerability, including rapid containment and remediation procedures. 9. Coordinate with Zenitel support and subscribe to their security advisories for timely updates and patches. 10. Educate relevant IT and security personnel about the vulnerability and its exploitation vectors to enhance detection and response capabilities.
Affected Countries
Netherlands, Germany, Sweden, Norway, Denmark, Finland, France, United Kingdom
CVE-2025-64093: Vulnerability in Zenitel ICX500
Description
Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-64093 is a remote code execution (RCE) vulnerability identified in the Zenitel ICX500 intercom system, specifically affecting firmware versions earlier than 1.4.3.3. The vulnerability arises from improper input validation in the hostname configuration parameter, allowing unauthenticated attackers to inject arbitrary commands. Because the hostname field is processed by the system without sufficient sanitization, attackers can craft malicious payloads that execute arbitrary code with system-level privileges. This flaw requires no authentication or user interaction, making it trivially exploitable over the network by any attacker who can reach the device. The vulnerability's CVSS 3.1 base score is 10.0, reflecting its critical nature with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially compromising the entire device. Although no public exploits have been reported yet, the severity and ease of exploitation make this a high-priority issue. The ICX500 is commonly deployed in enterprise and public safety environments for secure communication, meaning exploitation could lead to unauthorized access, data leakage, service disruption, or pivoting into internal networks. The vulnerability was reserved on 2025-10-27 and published on 2026-01-09 by NCSC-NL, indicating coordinated disclosure. No official patches or mitigation links are currently provided, emphasizing the need for vigilance and interim protective measures.
Potential Impact
For European organizations, the impact of CVE-2025-64093 is substantial. The Zenitel ICX500 is widely used in critical infrastructure sectors such as transportation, public safety, and industrial facilities across Europe. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, disrupt communication services, exfiltrate sensitive information, or use the device as a foothold for lateral movement within corporate or governmental networks. This could result in operational downtime, loss of sensitive data, reputational damage, and potential safety hazards if emergency communication systems are affected. Given the device’s role in secure communications, the confidentiality and integrity of communications could be severely undermined. The vulnerability’s unauthenticated nature and network accessibility increase the risk of widespread exploitation, especially in environments where ICX500 devices are internet-facing or insufficiently segmented. The lack of current patches means organizations must rely on compensating controls to reduce exposure until updates are available.
Mitigation Recommendations
1. Immediately identify all Zenitel ICX500 devices in your network and verify their firmware versions. 2. Apply the official firmware update to version 1.4.3.3 or later as soon as it becomes available from Zenitel. 3. Until patches are deployed, restrict network access to ICX500 devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted networks, including the internet. 4. Disable any unnecessary services or management interfaces on the ICX500 devices to reduce the attack surface. 5. Monitor network traffic and device logs for unusual hostname changes or command injection attempts, using intrusion detection systems tuned for this vulnerability. 6. Employ network-level anomaly detection to identify exploitation attempts targeting the hostname parameter. 7. Conduct regular vulnerability scans and penetration tests focusing on ICX500 devices to ensure no residual exposure. 8. Establish an incident response plan specific to this vulnerability, including rapid containment and remediation procedures. 9. Coordinate with Zenitel support and subscribe to their security advisories for timely updates and patches. 10. Educate relevant IT and security personnel about the vulnerability and its exploitation vectors to enhance detection and response capabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NCSC-NL
- Date Reserved
- 2025-10-27T09:43:10.201Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960d929a48af7d8ce7ea268
Added to database: 1/9/2026, 10:32:09 AM
Last enriched: 1/9/2026, 10:32:38 AM
Last updated: 1/9/2026, 11:53:48 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15501: OS Command Injection in Sangfor Operation and Maintenance Management System
CriticalCVE-2026-22584: CWE-94 Improper Control of Generation of Code ('Code Injection') in Salesforce Uni2TS
UnknownCVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle
LowCVE-2025-46299: Processing maliciously crafted web content may disclose internal states of the app in Apple tvOS
MediumCVE-2025-46298: Processing maliciously crafted web content may lead to an unexpected process crash in Apple tvOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.