Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9999: CWE-940 Improper Verification of Source of a Communication Channel in arcinfo PcVue

0
High
VulnerabilityCVE-2025-9999cvecve-2025-9999cwe-940cwe-1288
Published: Fri Sep 05 2025 (09/05/2025, 16:41:01 UTC)
Source: CVE Database V5
Vendor/Project: arcinfo
Product: PcVue

Description

Some payload elements of the messages sent between two stations in a networking architecture are not properly checked on the receiving station allowing an attacker to execute unauthorized commands in the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:51:10 UTC

Technical Analysis

CVE-2025-9999 identifies a vulnerability in arcinfo's PcVue software, specifically affecting versions 12.0.0, 15.0.0, and 16.0.0. The root cause is improper verification of the source of communication channels between two stations in the PcVue networking architecture. In this context, messages exchanged between stations contain payload elements that are insufficiently validated upon receipt. This weakness allows an attacker with network access to craft and send malicious messages that the receiving station accepts without proper source authentication or payload validation. Consequently, the attacker can execute unauthorized commands within the PcVue application environment. The vulnerability is classified under CWE-940 (Improper Verification of Source of a Communication Channel) and CWE-1288 (Improper Authentication). The CVSS v4.0 base score is 7.6, indicating high severity, with attack vector being adjacent network (AV:A), requiring high attack complexity (AC:H), no privileges or user interaction needed, but with high impact on confidentiality and integrity, and moderate impact on availability. The scope is limited to the PcVue application but affects multiple versions. No patches or known exploits are currently available, but the vulnerability poses a significant risk to environments relying on PcVue for industrial control or monitoring due to potential unauthorized command execution.

Potential Impact

The vulnerability allows attackers to execute unauthorized commands remotely within the PcVue application, potentially leading to manipulation or disruption of industrial control processes, data leakage, or sabotage. Confidentiality is at high risk as attackers can inject commands that may expose sensitive operational data. Integrity is severely impacted since unauthorized commands can alter system states or control logic, potentially causing unsafe conditions or operational failures. Availability impact is moderate, as malicious commands could disrupt normal operations but may not fully disable the system. The requirement for adjacent network access limits exploitation to attackers with some level of network proximity, such as insiders or attackers who have breached perimeter defenses. The lack of authentication and user interaction requirements increases the risk of automated or stealthy attacks. Organizations using PcVue in critical infrastructure sectors like energy, manufacturing, or transportation may face operational disruptions, safety hazards, and regulatory compliance issues if exploited.

Mitigation Recommendations

Until official patches are released, organizations should implement strict network segmentation to isolate PcVue stations and restrict communication to trusted devices only. Deploy network-level access controls and monitoring to detect anomalous message patterns or unauthorized communication attempts between stations. Employ deep packet inspection or application-layer gateways capable of validating PcVue protocol messages to identify and block malformed or suspicious payloads. Limit network access to PcVue systems to essential personnel and devices, using VPNs or secure tunnels with strong authentication. Conduct regular audits of PcVue configurations and logs to detect signs of unauthorized command execution. Engage with arcinfo for timely updates and apply patches immediately upon availability. Additionally, consider deploying intrusion detection systems tailored for industrial protocols and enhance incident response plans to address potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
arcinfo
Date Reserved
2025-09-04T16:34:24.743Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bb1516b1fe325ba15996e5

Added to database: 9/5/2025, 4:51:34 PM

Last enriched: 2/27/2026, 8:51:10 AM

Last updated: 3/26/2026, 7:45:05 AM

Views: 201

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses