Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64427: CWE-918: Server-Side Request Forgery (SSRF) in IceWhaleTech ZimaOS

0
High
VulnerabilityCVE-2025-64427cvecve-2025-64427cwe-918cwe-200
Published: Mon Mar 02 2026 (03/02/2026, 16:28:42 UTC)
Source: CVE Database V5
Vendor/Project: IceWhaleTech
Product: ZimaOS

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:09:10 UTC

Technical Analysis

CVE-2025-64427 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918 and CWE-200, affecting IceWhaleTech's ZimaOS, an operating system forked from CasaOS designed for Zima devices and x86-64 systems with UEFI firmware. In versions prior to 1.5.0, the system fails to properly validate or restrict URLs in requests crafted by authenticated local users. This flaw allows these users to send requests to internal IP addresses, including loopback addresses (127.0.0.1, localhost) and private network ranges, which are typically shielded from external or unauthorized access. By exploiting this, an attacker can interact with internal HTTP/HTTPS services that are not intended to be exposed to local users, potentially retrieving sensitive information or leveraging internal services for further attacks. The vulnerability requires the attacker to have local authenticated access but does not require any additional user interaction. The CVSS 3.1 base score is 7.1, indicating a high severity due to the network attack vector, low attack complexity, and high confidentiality impact, though integrity and availability impacts are minimal. No patches or mitigations have been publicly released, and no known exploits have been reported in the wild. This vulnerability highlights the risks of insufficient input validation in internal request handling mechanisms within operating systems tailored for specialized hardware.

Potential Impact

The primary impact of CVE-2025-64427 is the potential exposure of sensitive internal services and data within networks running ZimaOS. Attackers with authenticated local access can leverage the SSRF flaw to bypass network segmentation and access internal HTTP/HTTPS services that are otherwise inaccessible. This can lead to unauthorized disclosure of confidential information, such as configuration data, credentials, or internal APIs. While the vulnerability does not directly compromise data integrity or system availability, the information gained could facilitate further attacks, including privilege escalation or lateral movement within the network. Organizations deploying ZimaOS in environments with sensitive internal services are at risk of internal reconnaissance and data leakage. The requirement for local authentication limits the attack surface but does not eliminate risk, especially in multi-user or shared environments. The lack of a public patch increases exposure duration, emphasizing the need for immediate mitigation. The vulnerability could be particularly impactful in environments where ZimaOS devices are used as gateways or control points within critical infrastructure or enterprise networks.

Mitigation Recommendations

To mitigate CVE-2025-64427, organizations should first restrict and monitor local user access to ZimaOS systems, ensuring that only trusted users have authenticated local accounts. Implement strict access controls and auditing to detect unusual request patterns targeting internal IP ranges. Network segmentation should be enforced to limit the exposure of sensitive internal HTTP/HTTPS services, potentially by using firewall rules or network policies that restrict access from ZimaOS devices to critical internal services. Until an official patch is released, consider disabling or restricting features in ZimaOS that allow user-initiated URL requests or proxying to internal services. Employ application-layer filtering or proxy solutions that validate and sanitize URLs before processing. Regularly review and update authentication mechanisms to prevent unauthorized local access. Additionally, monitor logs for signs of SSRF exploitation attempts, such as requests to localhost or private IP addresses originating from authenticated users. Engage with IceWhaleTech for updates on patches and apply them promptly once available. Finally, consider isolating ZimaOS devices in less sensitive network segments if feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5bdaa32ffcdb8a2762eb3

Added to database: 3/2/2026, 4:41:14 PM

Last enriched: 3/9/2026, 5:09:10 PM

Last updated: 4/16/2026, 5:13:51 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses