Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64128: CWE-78 in Zenitel TCIV-3+

0
Critical
VulnerabilityCVE-2025-64128cvecve-2025-64128cwe-78
Published: Wed Nov 26 2025 (11/26/2025, 17:51:23 UTC)
Source: CVE Database V5
Vendor/Project: Zenitel
Product: TCIV-3+

Description

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:13:34 UTC

Technical Analysis

CVE-2025-64128 is an OS command injection vulnerability classified under CWE-78, affecting the Zenitel TCIV-3+ intercom system. The root cause is incomplete validation of user-supplied input, which fails to enforce adequate formatting rules. This flaw allows attackers to append arbitrary data to commands executed by the system, effectively enabling remote code execution. The vulnerability is exploitable remotely without requiring authentication or user interaction, making it highly dangerous. The CVSS v3.1 score of 10.0 reflects the vulnerability's critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), impacting confidentiality, integrity, and availability at the highest levels. Although no public exploits have been reported yet, the potential for severe impact is significant, especially given the device's role in communication and security infrastructure. The vulnerability was reserved on 2025-10-27 and published on 2025-11-26, with no patches currently available, indicating a need for urgent attention from affected organizations. The Zenitel TCIV-3+ is typically deployed in environments requiring robust communication, such as public safety, transportation, and industrial facilities, increasing the potential impact of exploitation.

Potential Impact

The impact of CVE-2025-64128 on European organizations can be severe. Successful exploitation allows an unauthenticated attacker to execute arbitrary OS commands on the affected device, leading to full system compromise. This can result in unauthorized disclosure of sensitive information, manipulation or disruption of communication systems, and denial of service. Given that Zenitel TCIV-3+ devices are often used in critical infrastructure sectors such as transportation, public safety, and industrial control systems, exploitation could disrupt essential services and pose safety risks. The vulnerability's network accessibility and lack of authentication requirements increase the attack surface, making it easier for threat actors to target European organizations. Additionally, the compromise of these devices could serve as a foothold for lateral movement within networks, escalating the threat to broader organizational assets. The critical severity and potential for widespread impact necessitate immediate risk mitigation, especially in sectors where communication integrity and availability are paramount.

Mitigation Recommendations

To mitigate CVE-2025-64128, European organizations should take the following specific actions: 1) Monitor Zenitel's official channels closely for security patches or firmware updates addressing this vulnerability and apply them immediately upon release. 2) Implement network segmentation to isolate TCIV-3+ devices from general IT networks, limiting exposure to potential attackers. 3) Restrict network access to these devices using firewall rules and access control lists, allowing only trusted management hosts to communicate with them. 4) Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious command injection patterns or anomalous traffic targeting the devices. 5) Conduct regular security audits and vulnerability scans focusing on intercom and communication devices to identify and remediate similar issues proactively. 6) Disable any unnecessary services or interfaces on the TCIV-3+ devices to reduce the attack surface. 7) Establish incident response procedures specific to communication device compromises to ensure rapid containment and recovery. 8) Educate relevant personnel on the risks associated with these devices and the importance of timely patching and monitoring. These targeted measures go beyond generic advice by focusing on the unique characteristics and deployment contexts of the Zenitel TCIV-3+ systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T18:03:35.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692740e20de433ec09559d6e

Added to database: 11/26/2025, 6:03:14 PM

Last enriched: 11/26/2025, 6:13:34 PM

Last updated: 11/26/2025, 10:10:00 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats