CVE-2025-12509
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-04

Assigner: bizerba

Description
On a client with an admin user, a Global_Shipping script can be implemented. The script could later be executed on the BRAIN2 server with administrator rights.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bizerba brain2 3.0.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12509 is a vulnerability in Bizerba's BRAIN2 server software versions prior to 3.0.7. It allows an administrator-level client user to implement a Global_Shipping script that can later be executed on the BRAIN2 server with administrator privileges. This can lead to full system compromise because the script runs with high-level rights on the server. [1]


How can this vulnerability impact me? :

This vulnerability can lead to a full system compromise of the BRAIN2 server. An attacker with administrator-level client access can execute malicious scripts with administrator rights on the server, potentially causing severe impacts on confidentiality, integrity, and availability of the system and its data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking if your BRAIN2 server is running a version prior to 3.0.7 and if any Global_Shipping scripts have been implemented by administrator-level users. You can verify the BRAIN2 version by querying the server software version. Additionally, inspect the presence of Global_Shipping scripts on the server. Specific commands are not provided in the resources, but generally, you would use administrative tools or commands to list implemented scripts and check user permissions related to Global_Shipping script implementation. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include revoking the rights of BRAIN2 users to implement Global_Shipping scripts. The definitive solution is to update the BRAIN2 server software to version 3.0.7 or later, where the vulnerability is fixed by preventing implementation and execution of Global_Shipping scripts and deleting any existing ones. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart