CVE-2025-34071
BaseFortify
Publication date: 2025-07-02
Last updated on: 2025-09-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gfi | kerio_control | 9.4.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a remote code execution flaw in GFI Kerio Control 9.4.5. Attackers who have administrative access can upload and execute arbitrary code by exploiting the firmware upgrade feature. The system accepts unsigned .img files for upgrades without validating their authenticity or integrity. Malicious scripts can be embedded within these upgrade images, such as in the upgrade.sh script or disk image components, which are then executed by the system after upload, granting the attacker root access.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized root access to the system, allowing attackers to execute arbitrary code remotely. This can lead to full system compromise, data theft, disruption of services, installation of malware, and loss of control over the affected device.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately restrict administrative access to the firmware upgrade feature, ensure only trusted personnel can perform upgrades, and avoid using unsigned or unverified .img files for system upgrades. Additionally, monitor for any unauthorized firmware uploads and consider disabling the firmware upgrade feature until a patch or update from the vendor is available.