Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64130: CWE-79 in Zenitel TCIV-3+

0
Critical
VulnerabilityCVE-2025-64130cvecve-2025-64130cwe-79
Published: Wed Nov 26 2025 (11/26/2025, 17:55:56 UTC)
Source: CVE Database V5
Vendor/Project: Zenitel
Product: TCIV-3+

Description

Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:13:59 UTC

Technical Analysis

CVE-2025-64130 identifies a reflected cross-site scripting (XSS) vulnerability classified under CWE-79 in the Zenitel TCIV-3+ intercom system. Reflected XSS occurs when untrusted user input is immediately returned by a web application without proper sanitization, allowing attackers to inject malicious JavaScript code. This vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is critical (CVSS 9.8), affecting confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation can lead to arbitrary script execution in the victim’s browser, enabling attackers to steal session cookies, perform actions on behalf of the user, or pivot into the internal network. The Zenitel TCIV-3+ device is commonly used in communication and security systems, often integrated into critical infrastructure environments. Although no public exploits or patches are currently available, the vulnerability’s severity demands immediate attention. The lack of patches suggests that organizations must rely on compensating controls until a vendor fix is released. The vulnerability was reserved on 2025-10-27 and published on 2025-11-26, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on Zenitel TCIV-3+ devices in critical infrastructure such as transportation hubs, public safety communication, and industrial control systems. Exploitation could lead to unauthorized access to sensitive communications, manipulation of intercom functions, and potential disruption of security operations. The ability to execute arbitrary JavaScript remotely without authentication increases the risk of widespread compromise, including data theft, espionage, and operational disruption. Given the critical nature of these systems, attacks could have cascading effects on public safety and business continuity. Additionally, compromised devices could serve as footholds for lateral movement within enterprise networks. The absence of known exploits in the wild provides a window for proactive defense, but the critical severity score underscores the urgency of mitigation.

Mitigation Recommendations

1. Immediately segment networks to isolate Zenitel TCIV-3+ devices from general user and internet-facing networks to reduce exposure. 2. Implement strict web application firewalls (WAFs) with custom rules to detect and block reflected XSS attack patterns targeting the device’s web interface. 3. Conduct thorough input validation and sanitization on any user-supplied data interacting with the device’s web services, if customization or integration is possible. 4. Monitor network traffic and device logs for unusual or suspicious activity indicative of attempted exploitation. 5. Restrict access to the device’s management interfaces to trusted IP addresses and enforce multi-factor authentication where possible. 6. Engage with Zenitel for timely patch releases and apply updates immediately upon availability. 7. Educate staff on the risks of reflected XSS and ensure secure browsing practices when accessing device interfaces. 8. Consider deploying endpoint detection and response (EDR) tools on systems interacting with these devices to detect potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T18:03:35.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692740e20de433ec09559d5f

Added to database: 11/26/2025, 6:03:14 PM

Last enriched: 11/26/2025, 6:13:59 PM

Last updated: 11/27/2025, 2:54:42 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats