HomeGfiCVE-2025-34071

CVE-2025-34071

CRITICAL
9.4CVSS
Published: 2025-07-02
Updated: 2025-09-17
AI Analysis

Description

A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attackers with administrative access to upload and execute arbitrary code through the firmware upgrade feature. The system upgrade mechanism accepts unsigned .img files, which can be modified to include malicious scripts within the upgrade.sh or disk image components. These modified upgrade images are not validated for authenticity or integrity, and are executed by the system post-upload, enabling root access.

CVSS Metrics

Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-306

Metadata

Primary Vendor
GFI
Published
7/2/2025
Last Modified
9/17/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

gfi : kerio_control

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-34071 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com