CVE-2025-10363
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-08
Assigner: Switzerland Government Common Vulnerability Program
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| topal_solutions_ag | topal_finanzbuchhaltung | 11.2.12.00 |
| topal_solutions_ag | topal_finanzbuchhaltung | 10.1.5.20 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Deserialization of Untrusted Data issue in Topal Solutions AG's Topal Finanzbuchhaltung software on Windows. It allows an attacker to execute remote code on the affected system by exploiting the way the software processes untrusted serialized data. This means that malicious data can be crafted to run arbitrary code remotely, potentially taking full control of the system. The vulnerability affects versions up to 10.1.5.20 and is fixed in version 11.2.12.00.
How can this vulnerability impact me? :
The vulnerability can lead to Remote Code Execution (RCE) on the affected system, which is a critical security risk. An attacker exploiting this flaw could gain full control over the system running Topal Finanzbuchhaltung, potentially leading to data theft, data manipulation, disruption of business operations, or further network compromise.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade Topal Finanzbuchhaltung to version 11.2.12.0 or later, as this version includes the security update that fixes the critical deserialization vulnerability allowing remote code execution. [1]