Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64129: CWE-787 in Zenitel TCIV-3+

0
High
VulnerabilityCVE-2025-64129cvecve-2025-64129cwe-787
Published: Wed Nov 26 2025 (11/26/2025, 17:54:07 UTC)
Source: CVE Database V5
Vendor/Project: Zenitel
Product: TCIV-3+

Description

CVE-2025-64129 is a high-severity out-of-bounds write vulnerability (CWE-787) affecting the Zenitel TCIV-3+ intercom device. This flaw allows a remote attacker to cause a denial-of-service by crashing the device without requiring authentication, though user interaction is needed. The vulnerability impacts confidentiality, integrity, and availability, with the most significant effect being availability due to device crashes. No known exploits are currently reported in the wild, and no patches have been released yet. European organizations using Zenitel TCIV-3+ devices, especially in critical infrastructure or industrial environments, could face operational disruptions. Mitigation should focus on network segmentation, restricting remote access, monitoring device behavior, and preparing for vendor patches. Countries with higher adoption of Zenitel products and critical infrastructure reliance on such intercom systems, such as Germany, France, the UK, and the Netherlands, are more likely to be affected. Given the ease of remote exploitation and impact on availability, this vulnerability is rated as high severity.

AI-Powered Analysis

AILast updated: 12/03/2025, 18:58:44 UTC

Technical Analysis

CVE-2025-64129 identifies a critical out-of-bounds write vulnerability (CWE-787) in the Zenitel TCIV-3+ intercom device. This vulnerability allows a remote attacker to write data outside the intended buffer boundaries, which can corrupt memory and lead to device crashes. The flaw can be triggered remotely over the network without requiring any privileges, although it requires some form of user interaction to exploit. The vulnerability primarily threatens the availability of the device by causing denial-of-service conditions, but it also has limited impact on confidentiality and integrity due to potential memory corruption. The CVSS v3.1 score of 7.6 reflects the high risk posed by this vulnerability, considering its network attack vector, low attack complexity, no privileges required, but requiring user interaction. Currently, there are no known exploits in the wild, and no patches have been released by Zenitel, increasing the urgency for organizations to implement interim mitigations. The affected product, TCIV-3+, is commonly used in industrial and critical communication environments, making the vulnerability particularly concerning for operational technology (OT) networks. The vulnerability was reserved in late October 2025 and published in November 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity, especially in sectors relying on Zenitel TCIV-3+ devices for secure communication, such as manufacturing, transportation, energy, and public safety. A successful exploitation could lead to denial-of-service conditions, disrupting communication channels critical for safety and operational coordination. The limited impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate concerns about potential memory corruption side effects. The lack of authentication requirement and remote exploitability increase the attack surface, particularly if devices are exposed to untrusted networks or insufficiently segmented environments. Disruptions could lead to operational downtime, safety hazards, and financial losses. The absence of patches necessitates proactive defensive measures to mitigate risks until vendor updates are available.

Mitigation Recommendations

1. Immediately implement strict network segmentation to isolate Zenitel TCIV-3+ devices from untrusted or public networks, limiting exposure to potential attackers. 2. Restrict remote access to these devices using firewalls and VPNs with strong authentication to prevent unauthorized connections. 3. Monitor network traffic and device logs for unusual activity or signs of exploitation attempts, employing intrusion detection systems tailored for OT environments. 4. Educate users and administrators about the requirement for user interaction in exploitation to reduce inadvertent triggering of the vulnerability. 5. Maintain an inventory of all affected devices and prioritize them for monitoring and mitigation efforts. 6. Engage with Zenitel support channels to obtain updates on patch availability and apply vendor patches promptly once released. 7. Consider deploying temporary compensating controls such as disabling unnecessary services or features on the devices to reduce attack vectors. 8. Develop and test incident response plans specific to potential denial-of-service events affecting communication devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T18:03:35.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692740e20de433ec09559d5a

Added to database: 11/26/2025, 6:03:14 PM

Last enriched: 12/3/2025, 6:58:44 PM

Last updated: 12/3/2025, 7:17:21 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats