CVE-2025-60595

8.2 HIGH

📋 TL;DR

CVE-2025-60595 allows arbitrary code execution in SPH Engineering UgCS 5.13.0 through improper neutralization of special elements used in a command. This affects all users running the vulnerable version of UgCS drone mission planning software. Attackers can execute commands with the privileges of the UgCS process.

💻 Affected Systems

Products:
  • SPH Engineering UgCS
Versions: 5.13.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of UgCS 5.13.0 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install malware, exfiltrate data, pivot to other systems, or disrupt drone operations.

🟠

Likely Case

Attacker gains control of UgCS server to manipulate drone missions, steal sensitive flight data, or use system as foothold for further attacks.

🟢

If Mitigated

Limited impact if network segmentation and least privilege controls prevent lateral movement and data access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires some level of access to UgCS interface but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.13.1 or later

Vendor Advisory: https://www.sphengineering.com

Restart Required: Yes

Instructions:

1. Download latest version from SPH Engineering website. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart UgCS service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate UgCS server from internet and restrict internal access to authorized users only.

Least Privilege Service Account

all

Run UgCS service under a limited user account with minimal permissions.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach UgCS interface
  • Monitor system for unusual process creation or network connections from UgCS service

🔍 How to Verify

Check if Vulnerable:

Check UgCS version in application interface or installation directory. Version 5.13.0 is vulnerable.

Check Version:

Check Help > About in UgCS GUI or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 5.13.1 or later and test functionality remains intact.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from UgCS service
  • Suspicious command execution patterns
  • Failed authentication attempts to UgCS

Network Indicators:

  • Unexpected outbound connections from UgCS server
  • Unusual traffic patterns to/from UgCS port

SIEM Query:

process_name:ugcs AND (process_parent:unusual OR cmdline:contains_suspicious)

🔗 References

📤 Share & Export