CVE-2025-68920

8.9 HIGH

📋 TL;DR

CVE-2025-68920 is a critical vulnerability in C-Kermit that allows a remote Kermit system to overwrite files on the local system or retrieve arbitrary files. This affects all users running vulnerable versions of C-Kermit, particularly those using it for file transfers between systems.

💻 Affected Systems

Products:
  • C-Kermit (ckermit)
Versions: All versions through 10.0 Beta.12 (416-beta12) before commit 244644d
Operating Systems: All operating systems running C-Kermit
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using C-Kermit for file transfers is vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file overwrite leading to remote code execution, or exfiltration of sensitive files including credentials and configuration data.

🟠

Likely Case

Unauthorized file retrieval or modification leading to data breach, system manipulation, or privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized Kermit connections.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if Kermit service is exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be in the file transfer protocol implementation, making exploitation straightforward for attackers with network access to the Kermit service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 244644d

Vendor Advisory: https://github.com/KermitProject/ckermit/pull/20

Restart Required: No

Instructions:

1. Update C-Kermit to version after commit 244644d. 2. For Debian/Ubuntu: apt update && apt upgrade ckermit. 3. For source builds: git pull from repository and rebuild.

🔧 Temporary Workarounds

Disable Kermit Service

linux

Stop and disable the Kermit service to prevent remote exploitation

sudo systemctl stop kermit
sudo systemctl disable kermit

Network Access Control

linux

Block incoming Kermit connections at firewall

sudo iptables -A INPUT -p tcp --dport 1649 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running C-Kermit
  • Monitor all Kermit connections and file transfer activities for anomalies

🔍 How to Verify

Check if Vulnerable:

Check C-Kermit version: kermit -V | grep -i version

Check Version:

kermit -V

Verify Fix Applied:

Verify version is after commit 244644d or check git log for inclusion of fix

📡 Detection & Monitoring

Log Indicators:

  • Unusual file transfer patterns in Kermit logs
  • Multiple failed or abnormal Kermit connections

Network Indicators:

  • Unexpected Kermit protocol traffic (typically port 1649)
  • File transfer requests to/from unusual locations

SIEM Query:

source="kermit.log" AND (file_transfer OR protocol_error)

🔗 References

📤 Share & Export