CVE-2025-64427

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated local users in ZimaOS to craft requests targeting internal IP addresses and services, potentially accessing HTTP/HTTPS services not meant to be exposed. It affects ZimaOS version 1.5.0 and earlier on Zima devices and x86-64 systems with UEFI.

💻 Affected Systems

Products:
  • ZimaOS
Versions: 1.5.0 and prior
Operating Systems: ZimaOS (fork of CasaOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Zima devices and x86-64 systems with UEFI running ZimaOS. Requires authenticated local user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized access to sensitive internal services, potentially leading to data exfiltration, privilege escalation, or lateral movement within the network.

🟠

Likely Case

Local authenticated users access internal administrative interfaces or services they shouldn't have access to, potentially compromising other systems on the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing sensitive internal services from being reachable.

🌐 Internet-Facing: LOW - Requires authenticated local access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Local authenticated users can exploit this to access internal services, posing significant risk in multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access and ability to craft HTTP requests. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-m8hj-7xg5-p375

Restart Required: No

Instructions:

No official patch available. Monitor vendor advisory for updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ZimaOS systems from sensitive internal networks to limit potential lateral movement.

Restrict Local User Access

all

Minimize number of authenticated local users and implement least privilege principles.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ZimaOS systems from sensitive internal services
  • Monitor network traffic for unusual requests to internal IP addresses from ZimaOS systems

🔍 How to Verify

Check if Vulnerable:

Check ZimaOS version. If version is 1.5.0 or earlier, system is vulnerable.

Check Version:

Check ZimaOS web interface or system information for version number

Verify Fix Applied:

No fix available to verify. Monitor vendor advisory for patch release.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from local users targeting internal IP addresses
  • Requests to localhost or private IP ranges from ZimaOS services

Network Indicators:

  • HTTP/HTTPS traffic from ZimaOS systems to internal IP addresses not normally accessed
  • Unusual port scanning or service discovery from ZimaOS hosts

SIEM Query:

source_ip=ZimaOS_IP AND (dest_ip=127.0.0.1 OR dest_ip=10.* OR dest_ip=172.16.* OR dest_ip=192.168.*) AND protocol=http OR protocol=https

🔗 References

📤 Share & Export