Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64693: Heap-based buffer overflow in Intercom, Inc. Security Point (Windows) of MaLion

0
Critical
VulnerabilityCVE-2025-64693cvecve-2025-64693
Published: Tue Nov 25 2025 (11/25/2025, 07:21:10 UTC)
Source: CVE Database V5
Vendor/Project: Intercom, Inc.
Product: Security Point (Windows) of MaLion

Description

Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

AI-Powered Analysis

AILast updated: 11/25/2025, 07:43:37 UTC

Technical Analysis

CVE-2025-64693 is a heap-based buffer overflow vulnerability identified in the Security Point (Windows) component of MaLion, a product by Intercom, Inc. The flaw exists in the way the software processes the Content-Length HTTP header. Specifically, when receiving a specially crafted request with manipulated Content-Length values, the software fails to properly validate or handle the input size, leading to a heap overflow condition. This memory corruption can be exploited by a remote attacker without authentication or user interaction to execute arbitrary code with SYSTEM-level privileges, effectively granting full control over the affected system. The vulnerability affects all versions prior to 7.1.1.9, and no patches were available at the time of disclosure, though the vendor is expected to release updates promptly. The CVSS v3.0 score of 9.8 indicates a critical severity, with attack vector as network, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as an attacker can fully compromise the system. No known exploits have been reported in the wild yet, but the ease of exploitation and high privileges gained make this a significant threat. The vulnerability is particularly concerning for environments where MaLion is deployed as a security management tool, as compromise could lead to broader network infiltration and control.

Potential Impact

For European organizations, the impact of CVE-2025-64693 could be severe. Given that the vulnerability allows remote, unauthenticated attackers to execute code with SYSTEM privileges, affected systems could be fully compromised, leading to data breaches, disruption of security services, and potential lateral movement within networks. Organizations in critical infrastructure, finance, healthcare, and government sectors using MaLion Security Point (Windows) are at heightened risk. The ability to gain SYSTEM-level access remotely could enable attackers to disable security controls, exfiltrate sensitive data, deploy ransomware, or establish persistent footholds. The lack of required authentication and user interaction increases the likelihood of exploitation. Additionally, the vulnerability could undermine trust in security management platforms, complicating incident response and recovery efforts. European entities must consider the potential for targeted attacks exploiting this vulnerability, especially given geopolitical tensions that may motivate adversaries to focus on strategic assets protected by MaLion.

Mitigation Recommendations

To mitigate CVE-2025-64693, European organizations should immediately upgrade affected MaLion Security Point (Windows) installations to version 7.1.1.9 or later once the patch is available. Until patches are deployed, network-level protections should be enforced, including blocking or filtering inbound traffic to the affected service ports from untrusted networks. Intrusion detection and prevention systems should be updated with signatures targeting exploitation attempts related to Content-Length header manipulation. Organizations should conduct thorough asset inventories to identify all instances of MaLion Security Point (Windows) and prioritize patching accordingly. Implementing network segmentation to isolate critical security management systems can reduce the blast radius of a potential compromise. Regular monitoring of logs and alerts for anomalous requests involving HTTP headers is advised. Additionally, applying application whitelisting and restricting administrative privileges can help limit the impact if exploitation occurs. Finally, organizations should prepare incident response plans specific to this vulnerability to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-18T02:02:16.257Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69255ab1292ce6fc00b965af

Added to database: 11/25/2025, 7:28:49 AM

Last enriched: 11/25/2025, 7:43:37 AM

Last updated: 11/25/2025, 9:12:34 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats