CVE-2025-1077 (GCVE-0-2025-1077)
Vulnerability from cvelistv5 – Published: 2025-02-07 08:32 – Updated: 2025-02-07 15:53
VLAI?
Summary
A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather). The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.
A remote unauthenticated
attacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code. This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices.
Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).
Severity ?
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| IBL Software Engineering | Visual Weather |
Affected:
8.2.5
Affected: 7.3.9 Affected: 7.3.6 (Enterprise Build) Affected: 8.5.2 (Enterprise Build) |
|||||||||||||||||
|
|||||||||||||||||||
Credits
Ianis BERNARD (NCIA)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1077",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-07T15:53:17.352997Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-07T15:53:44.186Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Visual Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NAMIS",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aero Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Satellite Weather",
"vendor": "IBL Software Engineering",
"versions": [
{
"status": "affected",
"version": "8.2.5"
},
{
"status": "affected",
"version": "7.3.9"
},
{
"status": "affected",
"version": "7.3.6 (Enterprise Build)"
},
{
"status": "affected",
"version": "8.5.2 (Enterprise Build)"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The vulnerability is triggered in server configurations where the \u003cb\u003ePDS pipeline\u003c/b\u003e utilizes the \u003cb\u003eIPDS pipeline\u003c/b\u003e with \u003cb\u003eMessage Editor Output Filters\u003c/b\u003e enabled\u003cbr\u003e"
}
],
"value": "The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ianis BERNARD (NCIA)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA security vulnerability has been identified in the \u003cb\u003eIBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)\u003c/b\u003e.\u0026nbsp;The vulnerability is present in the \u003cb\u003eProduct Delivery Service (PDS) component in specific server configurations\u003c/b\u003e where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\u003c/p\u003e\u003cp\u003eA remote\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eunauthenticated\u003c/span\u003e\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u0026nbsp;pipeline\u0026nbsp;with specially crafted Form Properties, enabling \u003cb\u003eremote execution of arbitrary Python code\u003c/b\u003e.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis vulnerability could lead to a \u003cb\u003efull system compromise\u003c/b\u003e of the affected server, particularly if Visual Weather services\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;are run under a privileged user account\u2014contrary to the documented installation best practices.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003c/span\u003e\n\n\u003cbr\u003e\u003c/span\u003e\u003c/p\u003e"
}
],
"value": "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote\u00a0unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
},
{
"capecId": "CAPEC-242",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-242 Code Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-07T08:43:31.311Z",
"orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
"shortName": "SK-CERT"
},
"references": [
{
"url": "https://www.iblsoft.com/security/advisory-isec-2024-001/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003cbr\u003e"
}
],
"value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution vulnerability in IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn order to mitigate the vulnerability:\u003cbr\u003e-\u0026nbsp;Disable PDS pipelines utilizing IPDS pipelines in server configurations.\u003cbr\u003e-\u0026nbsp;Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\u003cbr\u003e-\u0026nbsp;Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\u003cbr\u003e\u003cbr\u003eIt is also recommended to \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003econtact IBL Support Team for more detailed security and server hardening guidelines.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "In order to mitigate the vulnerability:\n-\u00a0Disable PDS pipelines utilizing IPDS pipelines in server configurations.\n-\u00a0Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\n-\u00a0Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\n\nIt is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
"assignerShortName": "SK-CERT",
"cveId": "CVE-2025-1077",
"datePublished": "2025-02-07T08:32:01.813Z",
"dateReserved": "2025-02-06T11:23:05.466Z",
"dateUpdated": "2025-02-07T15:53:44.186Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-1077\",\"sourceIdentifier\":\"incident@nbu.gov.sk\",\"published\":\"2025-02-07T09:15:08.380\",\"lastModified\":\"2025-02-07T09:15:08.380\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\\n\\nA remote\u00a0unauthenticated\\n\\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\\n\\n\\n\\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad de seguridad en Visual Weather de IBL Software Engineering y productos derivados (NAMIS, Aero Weather, Satellite Weather). La vulnerabilidad est\u00e1 presente en el componente Product Delivery Service (PDS) en configuraciones de servidor espec\u00edficas donde la canalizaci\u00f3n PDS utiliza la canalizaci\u00f3n IPDS con filtros de salida del editor de mensajes habilitados. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para enviar solicitudes no autenticadas para ejecutar la canalizaci\u00f3n IPDS con propiedades de formulario especialmente manipuladas, lo que permite la ejecuci\u00f3n remota de c\u00f3digo Python arbitrario. Esta vulnerabilidad podr\u00eda provocar un compromiso total del sistema del servidor afectado, en particular si los servicios de Visual Weather se ejecutan bajo una cuenta de usuario privilegiada, lo que contradice las pr\u00e1cticas recomendadas de instalaci\u00f3n documentadas. Actualice a las versiones parcheadas 7.3.10 (o superior), 8.6.0 (o superior).\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"incident@nbu.gov.sk\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":9.5,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"HIGH\",\"subAvailabilityImpact\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"incident@nbu.gov.sk\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"references\":[{\"url\":\"https://www.iblsoft.com/security/advisory-isec-2024-001/\",\"source\":\"incident@nbu.gov.sk\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-1077\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-07T15:53:17.352997Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-07T15:53:38.044Z\"}}], \"cna\": {\"title\": \"Remote Code Execution vulnerability in IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Ianis BERNARD (NCIA)\"}], \"impacts\": [{\"capecId\": \"CAPEC-153\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-153 Input Data Manipulation\"}]}, {\"capecId\": \"CAPEC-242\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-242 Code Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 9.5, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"IBL Software Engineering\", \"product\": \"Visual Weather\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.2.5\"}, {\"status\": \"affected\", \"version\": \"7.3.9\"}, {\"status\": \"affected\", \"version\": \"7.3.6 (Enterprise Build)\"}, {\"status\": \"affected\", \"version\": \"8.5.2 (Enterprise Build)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"IBL Software Engineering\", \"product\": \"NAMIS\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.2.5\"}, {\"status\": \"affected\", \"version\": \"7.3.9\"}, {\"status\": \"affected\", \"version\": \"7.3.6 (Enterprise Build)\"}, {\"status\": \"affected\", \"version\": \"8.5.2 (Enterprise Build)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"IBL Software Engineering\", \"product\": \"Aero Weather\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.2.5\"}, {\"status\": \"affected\", \"version\": \"7.3.9\"}, {\"status\": \"affected\", \"version\": \"7.3.6 (Enterprise Build)\"}, {\"status\": \"affected\", \"version\": \"8.5.2 (Enterprise Build)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"IBL Software Engineering\", \"product\": \"Satellite Weather\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.2.5\"}, {\"status\": \"affected\", \"version\": \"7.3.9\"}, {\"status\": \"affected\", \"version\": \"7.3.6 (Enterprise Build)\"}, {\"status\": \"affected\", \"version\": \"8.5.2 (Enterprise Build)\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.iblsoft.com/security/advisory-isec-2024-001/\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"In order to mitigate the vulnerability:\\n-\\u00a0Disable PDS pipelines utilizing IPDS pipelines in server configurations.\\n-\\u00a0Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\\n-\\u00a0Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\\n\\nIt is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIn order to mitigate the vulnerability:\u003cbr\u003e-\u0026nbsp;Disable PDS pipelines utilizing IPDS pipelines in server configurations.\u003cbr\u003e-\u0026nbsp;Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\u003cbr\u003e-\u0026nbsp;Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\u003cbr\u003e\u003cbr\u003eIt is also recommended to \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003econtact IBL Support Team for more detailed security and server hardening guidelines.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\\n\\nA remote\\u00a0unauthenticated\\n\\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\\u00a0pipeline\\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\\u00a0are run under a privileged user account\\u2014contrary to the documented installation best practices.\\n\\n\\n\\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA security vulnerability has been identified in the \u003cb\u003eIBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)\u003c/b\u003e.\u0026nbsp;The vulnerability is present in the \u003cb\u003eProduct Delivery Service (PDS) component in specific server configurations\u003c/b\u003e where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\u003c/p\u003e\u003cp\u003eA remote\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eunauthenticated\u003c/span\u003e\\n\\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u0026nbsp;pipeline\u0026nbsp;with specially crafted Form Properties, enabling \u003cb\u003eremote execution of arbitrary Python code\u003c/b\u003e.\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eThis vulnerability could lead to a \u003cb\u003efull system compromise\u003c/b\u003e of the affected server, particularly if Visual Weather services\u003c/span\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e\u0026nbsp;are run under a privileged user account\\u2014contrary to the documented installation best practices.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003c/span\u003e\\n\\n\u003cbr\u003e\u003c/span\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-502\", \"description\": \"CWE-502 Deserialization of Untrusted Data\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The vulnerability is triggered in server configurations where the \u003cb\u003ePDS pipeline\u003c/b\u003e utilizes the \u003cb\u003eIPDS pipeline\u003c/b\u003e with \u003cb\u003eMessage Editor Output Filters\u003c/b\u003e enabled\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"bc375322-d3d7-4481-b261-e29662236cfd\", \"shortName\": \"SK-CERT\", \"dateUpdated\": \"2025-02-07T08:43:31.311Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-1077\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-07T15:53:44.186Z\", \"dateReserved\": \"2025-02-06T11:23:05.466Z\", \"assignerOrgId\": \"bc375322-d3d7-4481-b261-e29662236cfd\", \"datePublished\": \"2025-02-07T08:32:01.813Z\", \"assignerShortName\": \"SK-CERT\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…