CVE-2025-22495

An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Configurations

No configuration.

History

26 Aug 2025, 11:15

Type Values Removed Values Added
Summary
  • (es) Se descubrió una vulnerabilidad de validación de entrada incorrecta en el campo de configuración del servidor NTP de la tarjeta Network-M2. Esto podría provocar que un usuario autenticado con privilegios elevados tenga la capacidad de ejecutar comandos arbitrarios. La vulnerabilidad se ha resuelto en la versión 3.0.4. Nota: Network-M2 ha sido declarado fuera de servicio a principios de 2024 y Network-M3 se ha lanzado como un reemplazo funcional y adecuado.
CWE CWE-20 CWE-78

24 Feb 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-24 17:15

Updated : 2025-08-26 11:15


NVD link : CVE-2025-22495

Mitre link : CVE-2025-22495

CVE.ORG link : CVE-2025-22495


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')