CVE-2025-10975

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code through deserialization attacks in the ZeroMQ component of GuanxingLu vlarl. It affects systems running vulnerable versions of this software where the reasoning server is exposed. Attackers can manipulate message arguments to trigger the vulnerability.

💻 Affected Systems

Products:
  • GuanxingLu vlarl
Versions: All versions up to commit 31abc0baf53ef8f5db666a1c882e1ea64def2997
Operating Systems: Any OS running Python with ZeroMQ
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the experiments.robot.bridge.reasoning_server::run_reasoning_server function. Rolling release model means specific version numbers aren't provided.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to run arbitrary commands on affected systems, potentially leading to data exfiltration or service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and input validation are in place, potentially only causing service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploit has been made public according to the CVE description. Remote exploitation is possible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 31abc0baf53ef8f5db666a1c882e1ea64def2997

Vendor Advisory: https://github.com/GuanxingLu/vlarl/issues/18

Restart Required: Yes

Instructions:

1. Update to the latest version of GuanxingLu vlarl. 2. Verify the commit hash is newer than 31abc0baf53ef8f5db666a1c882e1ea64def2997. 3. Restart the reasoning server service.

🔧 Temporary Workarounds

Network Segmentation

Linux

Restrict access to the reasoning server port to only trusted networks

iptables -A INPUT -p tcp --dport [REASONING_SERVER_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [REASONING_SERVER_PORT] -j DROP

Input Validation

all

Implement strict input validation for ZeroMQ messages before deserialization

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of the reasoning server
  • Monitor for suspicious deserialization attempts and implement application-level input validation

🔍 How to Verify

Check if Vulnerable:

Check if your vlarl commit hash is 31abc0baf53ef8f5db666a1c882e1ea64def2997 or older

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify the commit hash is newer than 31abc0baf53ef8f5db666a1c882e1ea64def2997

📡 Detection & Monitoring

Log Indicators:

  • Unusual ZeroMQ message patterns
  • Deserialization errors in application logs
  • Unexpected process spawns from reasoning server

Network Indicators:

  • Unusual traffic to reasoning server port
  • Malformed ZeroMQ messages

SIEM Query:

source="application.log" AND "deserialization" AND "reasoning_server"

🔗 References

📤 Share & Export