CVE-2025-67707

5.6 MEDIUM

📋 TL;DR

ArcGIS Server versions 11.5 and earlier on Windows and Linux contain a file upload vulnerability that allows remote attackers to upload arbitrary files. However, server-side controls prevent execution of uploaded content and modification of existing files, limiting the impact. Organizations running affected ArcGIS Server versions are vulnerable.

💻 Affected Systems

Products:
  • ArcGIS Server
Versions: 11.5 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could upload malicious files to the server, potentially consuming disk space or attempting to bypass security controls, though execution and system modification are prevented.

🟠

Likely Case

Limited file upload capability without execution or system impact, potentially causing minor resource consumption or serving as a foothold for further attacks if other vulnerabilities exist.

🟢

If Mitigated

No significant impact due to server-side execution prevention and file modification restrictions.

🌐 Internet-Facing: MEDIUM - Remote attackers can upload files, but impact is limited by server controls.
🏢 Internal Only: LOW - Internal attackers could upload files, but same limitations apply with minimal impact.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote unauthenticated exploitation is possible, but impact is limited by server-side controls preventing execution and file modification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply ArcGIS Server Security 2025 Update 2 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch

Restart Required: Yes

Instructions:

1. Download the ArcGIS Server Security 2025 Update 2 Patch from Esri
2. Stop ArcGIS Server services
3. Apply the patch according to Esri documentation
4. Restart ArcGIS Server services
5. Verify successful patch installation

🔧 Temporary Workarounds

Restrict File Upload Endpoints

all

Configure web application firewall or reverse proxy to block or restrict access to file upload endpoints

Implement File Upload Validation

all

Add custom validation to reject unexpected file types and limit upload sizes

🧯 If You Can't Patch

  • Implement network segmentation to isolate ArcGIS Server from untrusted networks
  • Deploy web application firewall with strict file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Check ArcGIS Server version against affected versions (11.5 and earlier)

Check Version:

Check ArcGIS Server Administrator Directory or management console for version information

Verify Fix Applied:

Verify ArcGIS Server Security 2025 Update 2 Patch is installed and version is updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in ArcGIS Server logs
  • Multiple failed or successful file upload attempts from single sources

Network Indicators:

  • HTTP POST requests to file upload endpoints with unusual file types or sizes

SIEM Query:

source="arcgis-server" AND (event="file_upload" OR uri="*upload*") AND (file_type!="expected_types" OR size>limit)

🔗 References

📤 Share & Export