CVE-2025-64091

8.6 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands by manipulating NTP configuration settings on affected devices. It affects Zenitel devices with vulnerable firmware versions. Attackers with valid credentials can achieve remote code execution.

💻 Affected Systems

Products:
  • Zenitel devices with vulnerable firmware
Versions: Specific versions not detailed in reference, but based on CVE-2025-64091 advisory
Operating Systems: Embedded Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to device management interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to lateral movement, data exfiltration, or deployment of persistent malware across the network.

🟠

Likely Case

Unauthorized command execution allowing privilege escalation, configuration changes, or installation of backdoors on vulnerable devices.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and proper monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zenitel security advisory for specific patched versions

Vendor Advisory: https://www.zenitel.com/sites/default/files/2025-12/A100K12333%20Zenitel%20Security%20Advisory.pdf

Restart Required: Yes

Instructions:

1. Review Zenitel security advisory. 2. Download appropriate firmware update. 3. Backup device configuration. 4. Apply firmware update following vendor instructions. 5. Verify update success and functionality.

🔧 Temporary Workarounds

Restrict NTP Configuration Access

all

Limit access to NTP configuration interface to trusted administrators only

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for device management interfaces
  • Monitor NTP configuration changes and command execution attempts in device logs

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Zenitel security advisory and test if authenticated users can inject commands via NTP configuration fields

Check Version:

Device-specific command - consult device documentation or web interface

Verify Fix Applied:

Verify firmware version matches patched version from advisory and test that command injection via NTP configuration is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual NTP configuration changes
  • Unexpected command execution events
  • Multiple failed authentication attempts followed by NTP configuration changes

Network Indicators:

  • Unusual outbound connections from device following NTP configuration changes
  • Traffic to unexpected destinations

SIEM Query:

source="device_logs" AND (event="ntp_config_change" OR event="command_execution") AND user!="authorized_admin"

🔗 References

📤 Share & Export