Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64693: Heap-based buffer overflow in Intercom, Inc. Security Point (Windows) of MaLion

0
Critical
VulnerabilityCVE-2025-64693cvecve-2025-64693
Published: Tue Nov 25 2025 (11/25/2025, 07:21:10 UTC)
Source: CVE Database V5
Vendor/Project: Intercom, Inc.
Product: Security Point (Windows) of MaLion

Description

Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:43:56 UTC

Technical Analysis

CVE-2025-64693 is a heap-based buffer overflow vulnerability identified in the Windows version of Security Point, a component of MaLion by Intercom, Inc. The vulnerability is triggered during the processing of the Content-Length header in network requests. Specifically, when Security Point receives a specially crafted request with a malformed Content-Length value, it improperly allocates or manages heap memory, leading to a buffer overflow condition. This overflow can corrupt memory structures and enable an attacker to execute arbitrary code with SYSTEM-level privileges remotely. The vulnerability does not require any authentication or user interaction, making it exploitable by any unauthenticated attacker with network access to the affected service. The CVSS 3.0 score of 9.8 reflects the vulnerability's critical nature, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The impact includes full compromise of the affected system, allowing attackers to gain complete control, steal sensitive data, disrupt services, or move laterally within a network. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for threat actors once exploit code becomes available. The affected versions are all prior to 7.1.1.9, and users are advised to upgrade to the patched version as soon as possible. The vulnerability was published on November 25, 2025, by JPCERT, indicating a recent disclosure. Due to the criticality and ease of exploitation, organizations using MaLion Security Point on Windows should prioritize remediation and implement compensating controls immediately.

Potential Impact

For European organizations, the impact of CVE-2025-64693 is significant. The ability for an unauthenticated remote attacker to execute arbitrary code with SYSTEM privileges means complete takeover of affected systems is possible. This can lead to data breaches involving sensitive personal and corporate data, disruption of critical services, and potential lateral movement within networks to compromise additional assets. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the high value of their data and services. The vulnerability could also be leveraged to deploy ransomware or other malware, causing operational downtime and financial losses. Given the widespread use of Windows environments and the presence of MaLion Security Point in enterprise security stacks, the scope of affected systems could be broad. The lack of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention to prevent future exploitation. Failure to address this vulnerability could result in regulatory penalties under GDPR if personal data is compromised.

Mitigation Recommendations

1. Immediately upgrade all instances of Security Point (Windows) of MaLion to version 7.1.1.9 or later, where the vulnerability is patched. 2. Implement network-level filtering to restrict access to the Security Point service from untrusted networks, using firewalls or segmentation to limit exposure. 3. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting anomalous Content-Length header manipulations. 4. Conduct thorough logging and monitoring of network traffic to identify suspicious requests targeting the Content-Length header. 5. Apply strict input validation and sanitization on all incoming requests where possible, to prevent malformed headers from reaching vulnerable code paths. 6. Perform regular vulnerability scanning and penetration testing focused on this vulnerability to ensure remediation effectiveness. 7. Develop and test incident response plans specifically addressing potential exploitation scenarios involving this vulnerability. 8. Educate IT and security teams about the nature of this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-18T02:02:16.257Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69255ab1292ce6fc00b965af

Added to database: 11/25/2025, 7:28:49 AM

Last enriched: 12/2/2025, 2:43:56 PM

Last updated: 1/10/2026, 10:10:37 PM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats