CVE-2025-64984

6.1 MEDIUM

📋 TL;DR

This vulnerability allows reflected cross-site scripting (XSS) attacks in Kaspersky security products for Linux and Mac. Attackers can use phishing techniques to inject malicious scripts that execute in victims' browsers. Affected users include those running Kaspersky Endpoint Security for Linux, Kaspersky Industrial CyberSecurity for Linux Nodes, or Kaspersky Endpoint Security for Mac with outdated anti-virus databases.

💻 Affected Systems

Products:
  • Kaspersky Endpoint Security for Linux
  • Kaspersky Industrial CyberSecurity for Linux Nodes
  • Kaspersky Endpoint Security for Mac
Versions: All versions with anti-virus databases prior to 18.11.2025 (Mac versions: 12.0.0.325, 12.1.0.553, 12.2.0.694)
Operating Systems: Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in web interface components that process user input without proper sanitization.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, authentication tokens, or credentials, leading to account compromise and potential lateral movement within the network.

🟠

Likely Case

Attacker steals browser session data or redirects users to malicious sites through phishing links.

🟢

If Mitigated

Limited impact with proper web security controls like Content Security Policy and input validation.

🌐 Internet-Facing: MEDIUM - Requires user interaction via phishing but can target internet-facing web interfaces.
🏢 Internal Only: LOW - Primarily requires user interaction with malicious links, less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but uses standard XSS techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update anti-virus databases to version dated 18.11.2025 or later

Vendor Advisory: https://support.kaspersky.com/vulnerability/list-of-advisories/12430#181125

Restart Required: No

Instructions:

1. Open Kaspersky management console. 2. Check current anti-virus database version. 3. Update databases to 18.11.2025 or newer. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable web interface

linux

Temporarily disable the vulnerable web interface components if not required.

Consult Kaspersky documentation for your specific product to disable web management interface

Implement WAF rules

all

Deploy web application firewall rules to block XSS payloads.

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers
  • Educate users about phishing risks and suspicious links

🔍 How to Verify

Check if Vulnerable:

Check anti-virus database version in Kaspersky interface - if date is before 18.11.2025, system is vulnerable.

Check Version:

On Linux: sudo kesl-control --get-stat | grep 'Anti-virus databases'

Verify Fix Applied:

Confirm anti-virus database version shows 18.11.2025 or later date.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web requests with script tags or JavaScript payloads
  • Multiple failed XSS attempts in web logs

Network Indicators:

  • HTTP requests containing suspicious script parameters
  • Traffic to known phishing domains

SIEM Query:

web.url CONTAINS "<script>" OR web.url CONTAINS "javascript:" AND device.vendor="Kaspersky"

🔗 References

📤 Share & Export