CVE-2025-58432

7.8 HIGH

📋 TL;DR

This vulnerability allows any user with localhost access to upload files as root on ZimaOS systems. It affects all versions up to 1.4.1, enabling privilege escalation and potential system compromise. Users of ZimaOS on Zima devices or x86-64 systems with UEFI are impacted.

💻 Affected Systems

Products:
  • ZimaOS
Versions: All versions up to and including 1.4.1
Operating Systems: ZimaOS (Linux-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Zima devices and x86-64 systems with UEFI running ZimaOS. Requires localhost access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover via root-level file upload leading to remote code execution, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation allowing attackers to gain root access and install backdoors or malware.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent localhost access from unauthorized users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires localhost access but is straightforward once that access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.4.1

Vendor Advisory: https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-3gp9-43rg-xrcc

Restart Required: Yes

Instructions:

1. Update ZimaOS to version after 1.4.1. 2. Restart the system. 3. Verify the /v2_1/files/file/uploadV2 endpoint no longer allows root file uploads from any localhost user.

🔧 Temporary Workarounds

Restrict localhost access

linux

Implement firewall rules to restrict localhost access to authorized users only.

iptables -A INPUT -i lo -s 127.0.0.1 -j DROP
iptables -A INPUT -i lo -j ACCEPT

Disable vulnerable endpoint

linux

Block or disable the /v2_1/files/file/uploadV2 endpoint if not needed.

systemctl stop zimaos-service
Edit configuration to remove endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ZimaOS systems from untrusted networks.
  • Deploy host-based intrusion detection systems to monitor for unauthorized file uploads.

🔍 How to Verify

Check if Vulnerable:

Check ZimaOS version: if version ≤ 1.4.1, system is vulnerable. Test localhost access to /v2_1/files/file/uploadV2 endpoint.

Check Version:

cat /etc/os-release | grep VERSION

Verify Fix Applied:

After update, confirm version > 1.4.1 and test that file uploads from localhost no longer execute as root.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in ZimaOS logs
  • Root privilege escalation attempts in system logs

Network Indicators:

  • Unexpected connections to localhost on ZimaOS service ports
  • File upload requests to /v2_1/files/file/uploadV2

SIEM Query:

source="zimaos.log" AND ("uploadV2" OR "file/upload")

🔗 References

📤 Share & Export