Search criteria
1 vulnerability by IBL Software Engineering
CVE-2025-1077 (GCVE-0-2025-1077)
Vulnerability from cvelistv5 – Published: 2025-02-07 08:32 – Updated: 2025-02-07 15:53
VLAI?
Summary
A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather). The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.
A remote unauthenticated
attacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code. This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices.
Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).
Severity ?
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| IBL Software Engineering | Visual Weather |
Affected:
8.2.5
Affected: 7.3.9 Affected: 7.3.6 (Enterprise Build) Affected: 8.5.2 (Enterprise Build) |
|||||||||||||||||
|
|||||||||||||||||||
Credits
Ianis BERNARD (NCIA)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1077",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-07T15:53:17.352997Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-07T15:53:44.186Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Visual Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NAMIS",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aero Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Satellite Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The vulnerability is triggered in server configurations where the \u003cb\u003ePDS pipeline\u003c/b\u003e utilizes the \u003cb\u003eIPDS pipeline\u003c/b\u003e with \u003cb\u003eMessage Editor Output Filters\u003c/b\u003e enabled\u003cbr\u003e"
}
],
"value": "The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ianis BERNARD (NCIA)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA security vulnerability has been identified in the \u003cb\u003eIBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)\u003c/b\u003e.\u0026nbsp;The vulnerability is present in the \u003cb\u003eProduct Delivery Service (PDS) component in specific server configurations\u003c/b\u003e where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\u003c/p\u003e\u003cp\u003eA remote\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eunauthenticated\u003c/span\u003e\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u0026nbsp;pipeline\u0026nbsp;with specially crafted Form Properties, enabling \u003cb\u003eremote execution of arbitrary Python code\u003c/b\u003e.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis vulnerability could lead to a \u003cb\u003efull system compromise\u003c/b\u003e of the affected server, particularly if Visual Weather services\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;are run under a privileged user account\u2014contrary to the documented installation best practices.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003c/span\u003e\n\n\u003cbr\u003e\u003c/span\u003e\u003c/p\u003e"
}
],
"value": "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote\u00a0unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
},
{
"capecId": "CAPEC-242",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-242 Code Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-07T08:43:31.311Z",
"orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
"shortName": "SK-CERT"
},
"references": [
{
"url": "https://www.iblsoft.com/security/advisory-isec-2024-001/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003cbr\u003e"
}
],
"value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution vulnerability in IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn order to mitigate the vulnerability:\u003cbr\u003e-\u0026nbsp;Disable PDS pipelines utilizing IPDS pipelines in server configurations.\u003cbr\u003e-\u0026nbsp;Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\u003cbr\u003e-\u0026nbsp;Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\u003cbr\u003e\u003cbr\u003eIt is also recommended to \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003econtact IBL Support Team for more detailed security and server hardening guidelines.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "In order to mitigate the vulnerability:\n-\u00a0Disable PDS pipelines utilizing IPDS pipelines in server configurations.\n-\u00a0Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\n-\u00a0Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\n\nIt is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
"assignerShortName": "SK-CERT",
"cveId": "CVE-2025-1077",
"datePublished": "2025-02-07T08:32:01.813Z",
"dateReserved": "2025-02-06T11:23:05.466Z",
"dateUpdated": "2025-02-07T15:53:44.186Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}