Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68920: CWE-862 Missing Authorization in kermitproject C-Kermit

0
High
VulnerabilityCVE-2025-68920cvecve-2025-68920cwe-862
Published: Wed Dec 24 2025 (12/24/2025, 21:47:22 UTC)
Source: CVE Database V5
Vendor/Project: kermitproject
Product: C-Kermit

Description

CVE-2025-68920 is a high-severity vulnerability in C-Kermit versions through 10. 0 Beta. 12 that allows a remote Kermit system to bypass authorization controls. This flaw enables unauthorized remote attackers to overwrite or retrieve arbitrary files on the local system without authentication or user interaction. The vulnerability stems from missing authorization checks (CWE-862) in the file transfer functionality of C-Kermit, potentially leading to full confidentiality and integrity compromise. Exploitation requires network access but no privileges or user interaction, and the vulnerability has a CVSS score of 8. 9. Although no known exploits are currently reported in the wild, the impact on affected systems could be severe. European organizations using C-Kermit, especially in sectors relying on legacy or specialized communication protocols, are at risk. Mitigation involves applying patches once available, restricting network access to C-Kermit services, and monitoring for unusual file access patterns.

AI-Powered Analysis

AILast updated: 12/31/2025, 22:36:51 UTC

Technical Analysis

CVE-2025-68920 is a critical vulnerability identified in the C-Kermit software, a widely used file transfer and management tool that supports the Kermit protocol. The vulnerability exists in versions up to 10.0 Beta.12 (including version 7), where the software fails to enforce proper authorization checks (CWE-862) during remote file operations. Specifically, a remote Kermit system can exploit this flaw to overwrite arbitrary files on the local system or retrieve any files without requiring authentication or user interaction. This is due to missing or insufficient authorization controls in the file transfer mechanisms of C-Kermit. The vulnerability has a CVSS 3.1 base score of 8.9, indicating high severity, with the vector string AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L. This means the attack is network-based, requires high attack complexity, no privileges, no user interaction, and affects confidentiality and integrity at a high level, with a limited impact on availability. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. No patches are currently linked, and no known exploits have been reported in the wild, but the potential for exploitation is significant given the nature of the flaw. The vulnerability could be leveraged by attackers to gain unauthorized access to sensitive files or disrupt system integrity by overwriting critical files, potentially leading to data breaches or system compromise. This is particularly concerning for organizations that rely on C-Kermit for secure file transfers in operational environments.

Potential Impact

For European organizations, the impact of CVE-2025-68920 could be substantial, especially in sectors such as telecommunications, government, research institutions, and industrial control systems where C-Kermit might still be in use for legacy or specialized communication needs. Unauthorized file overwriting can lead to data corruption, loss of critical configuration files, or insertion of malicious payloads, compromising system integrity and availability. Unauthorized file retrieval threatens confidentiality, potentially exposing sensitive or regulated data subject to GDPR compliance. The high severity and network-based exploitability mean attackers could remotely compromise systems without needing credentials or user interaction, increasing the risk of widespread impact. Disruption or data leakage could result in operational downtime, regulatory penalties, and reputational damage. Given the lack of known exploits currently, proactive mitigation is essential to prevent future attacks. The vulnerability's presence in older or beta versions suggests that organizations running outdated software are particularly vulnerable.

Mitigation Recommendations

1. Immediately inventory all systems running C-Kermit, especially versions up to 10.0 Beta.12 and version 7, to identify vulnerable installations. 2. Apply vendor patches or updates as soon as they become available; monitor official kermitproject channels for security advisories. 3. If patches are not yet available, restrict network access to C-Kermit services using firewalls or network segmentation to limit exposure to trusted hosts only. 4. Implement strict access controls and monitoring on systems running C-Kermit to detect unusual file access or modification patterns indicative of exploitation attempts. 5. Consider disabling or replacing C-Kermit with alternative secure file transfer solutions that enforce robust authorization and authentication mechanisms. 6. Conduct regular security audits and penetration testing focused on legacy communication protocols and software to identify similar authorization weaknesses. 7. Educate system administrators about the risks of running outdated or beta software in production environments and enforce patch management policies. 8. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous Kermit protocol activities. 9. Maintain comprehensive backups of critical files to enable recovery in case of file overwriting or corruption. 10. Coordinate with European cybersecurity agencies for threat intelligence sharing and incident response support if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-24T21:47:22.655Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694c648a9a174f390b50ac19

Added to database: 12/24/2025, 10:09:14 PM

Last enriched: 12/31/2025, 10:36:51 PM

Last updated: 2/7/2026, 1:46:39 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats