CVE-2025-64113

9.8 CRITICAL

📋 TL;DR

CVE-2025-64113 is an authentication bypass vulnerability in Emby Server that allows attackers to gain full administrative access to the media server. Any Emby Server instance running versions below 4.9.1.81 is vulnerable, regardless of configuration. Attackers only need network access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Emby Server
Versions: All versions below 4.9.1.81
Operating Systems: All supported platforms (Windows, Linux, macOS, Docker)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations are vulnerable regardless of authentication settings or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Emby Server with administrative privileges, allowing attackers to modify server settings, access all media content, install malicious plugins, and potentially pivot to other systems on the network.

🟠

Likely Case

Unauthorized administrative access leading to media content theft, server configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact if server is isolated behind strict network controls with no internet exposure.

🌐 Internet-Facing: HIGH - Any internet-facing Emby Server is immediately vulnerable to remote exploitation without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability with network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory suggests exploitation requires only network access with no authentication or special conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.1.81

Vendor Advisory: https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84

Restart Required: Yes

Instructions:

1. Download Emby Server 4.9.1.81 from official sources. 2. Stop the Emby Server service. 3. Install the update. 4. Restart the Emby Server service.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Emby Server using firewall rules

# Linux iptables example: iptables -A INPUT -p tcp --dport 8096 -s trusted_ip -j ACCEPT
# Windows Firewall: New-NetFirewallRule -DisplayName 'Emby Access' -Direction Inbound -Protocol TCP -LocalPort 8096 -RemoteAddress trusted_ip -Action Allow

🧯 If You Can't Patch

  • Immediately restrict network access to Emby Server using firewall rules to only trusted IP addresses
  • Monitor Emby Server logs for unauthorized access attempts and consider taking the server offline until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check Emby Server version in web interface dashboard or via system information page

Check Version:

# Linux: emby-server --version or check /usr/lib/emby-server/system/EmbyServer.dll version
# Windows: Check installed programs list or Emby Server tray icon version info

Verify Fix Applied:

Confirm version is 4.9.1.81 or higher in Emby Server dashboard

📡 Detection & Monitoring

Log Indicators:

  • Unexpected administrative login events
  • Configuration changes from unknown IP addresses
  • Failed authentication attempts followed by successful administrative access

Network Indicators:

  • Unusual administrative API calls from unexpected sources
  • Traffic to Emby Server administrative endpoints from unauthorized IPs

SIEM Query:

source='emby.log' AND (event='AdminLogin' OR event='ConfigurationChange') AND src_ip NOT IN (trusted_ip_list)

🔗 References

📤 Share & Export