CVE-2025-3232
BaseFortify
Publication date: 2025-12-24
Last updated on: 2025-12-29
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows a remote attacker who is not authenticated to bypass authentication by using a specific API route. By exploiting this, the attacker can execute arbitrary operating system commands on the affected system.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized execution of arbitrary OS commands, which may compromise the integrity of the system. Although it does not impact confidentiality or availability, it can cause a high impact on the integrity of the system, potentially allowing attackers to manipulate or control system functions.