Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64128: CWE-78 in Zenitel TCIV-3+

0
Critical
VulnerabilityCVE-2025-64128cvecve-2025-64128cwe-78
Published: Wed Nov 26 2025 (11/26/2025, 17:51:23 UTC)
Source: CVE Database V5
Vendor/Project: Zenitel
Product: TCIV-3+

Description

CVE-2025-64128 is a critical OS command injection vulnerability in the Zenitel TCIV-3+ intercom system. It arises from insufficient validation of user input, allowing unauthenticated attackers to inject arbitrary OS commands. The vulnerability has a maximum CVSS score of 10. 0, indicating it can fully compromise confidentiality, integrity, and availability without requiring authentication or user interaction. No known public exploits exist yet. This flaw could enable attackers to take full control of affected devices, disrupt communications, or pivot into internal networks. European organizations using Zenitel TCIV-3+ devices, especially in critical infrastructure or public safety sectors, face significant risk. Immediate mitigation involves isolating affected devices, applying vendor patches once available, and implementing strict network segmentation and input filtering. Countries with high deployments of Zenitel products and critical infrastructure reliance, such as Germany, France, and the UK, are most likely to be targeted.

AI-Powered Analysis

AILast updated: 12/03/2025, 18:57:37 UTC

Technical Analysis

CVE-2025-64128 is an OS command injection vulnerability classified under CWE-78 found in the Zenitel TCIV-3+ intercom system. The root cause is incomplete validation of user-supplied input, which fails to enforce adequate formatting rules, allowing attackers to append arbitrary data to commands executed by the system. This vulnerability can be exploited remotely by unauthenticated attackers, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N), meaning no privileges or user interaction are required. The vulnerability affects all versions of the product (noted as version 0, likely meaning all current versions). Successful exploitation results in complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), enabling attackers to execute arbitrary OS commands, potentially leading to full device takeover, data theft, or service disruption. The vulnerability was reserved on 2025-10-27 and published on 2025-11-26. No public exploits are known at this time, but the critical severity and ease of exploitation make it a high-priority issue. Zenitel TCIV-3+ devices are commonly used in communication and security systems, often in industrial, public safety, and critical infrastructure environments, increasing the potential impact of this vulnerability.

Potential Impact

The impact of CVE-2025-64128 on European organizations is severe. Given the critical nature of the vulnerability and the widespread use of Zenitel TCIV-3+ in communication systems, exploitation could lead to unauthorized command execution, full device compromise, and disruption of critical communication channels. This could affect public safety, emergency response, industrial control systems, and enterprise security operations. Confidential information could be exfiltrated, and attackers could use compromised devices as footholds for lateral movement within networks. The lack of authentication requirement and ease of exploitation increase the risk of rapid and widespread attacks. Disruption or manipulation of intercom and communication systems could have cascading effects on operational continuity and safety in sectors such as transportation, healthcare, and government facilities across Europe.

Mitigation Recommendations

1. Immediately isolate Zenitel TCIV-3+ devices from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual command execution patterns or unexpected connections originating from these devices. 3. Apply vendor patches or firmware updates as soon as they become available; maintain close communication with Zenitel for updates. 4. Implement strict input validation and filtering at network boundaries to prevent injection of malicious commands. 5. Employ network segmentation to separate critical communication devices from general IT infrastructure. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting these devices. 7. Conduct regular security audits and penetration testing focused on intercom and communication systems. 8. Develop and rehearse incident response plans specific to communication system compromises. 9. Restrict physical and remote access to the devices to authorized personnel only. 10. Educate staff on the risks and signs of exploitation related to these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T18:03:35.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692740e20de433ec09559d6e

Added to database: 11/26/2025, 6:03:14 PM

Last enriched: 12/3/2025, 6:57:37 PM

Last updated: 1/10/2026, 9:25:49 PM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats