CVE-2025-12509
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-04
Assigner: bizerba
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bizerba | brain2 | 3.0.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-829 | The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-12509 is a vulnerability in Bizerba's BRAIN2 server software versions prior to 3.0.7. It allows an administrator-level client user to implement a Global_Shipping script that can later be executed on the BRAIN2 server with administrator privileges. This can lead to full system compromise because the script runs with high-level rights on the server. [1]
How can this vulnerability impact me? :
This vulnerability can lead to a full system compromise of the BRAIN2 server. An attacker with administrator-level client access can execute malicious scripts with administrator rights on the server, potentially causing severe impacts on confidentiality, integrity, and availability of the system and its data. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves checking if your BRAIN2 server is running a version prior to 3.0.7 and if any Global_Shipping scripts have been implemented by administrator-level users. You can verify the BRAIN2 version by querying the server software version. Additionally, inspect the presence of Global_Shipping scripts on the server. Specific commands are not provided in the resources, but generally, you would use administrative tools or commands to list implemented scripts and check user permissions related to Global_Shipping script implementation. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include revoking the rights of BRAIN2 users to implement Global_Shipping scripts. The definitive solution is to update the BRAIN2 server software to version 3.0.7 or later, where the vulnerability is fixed by preventing implementation and execution of Global_Shipping scripts and deleting any existing ones. [1]