CVE-2025-34071

A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attackers with administrative access to upload and execute arbitrary code through the firmware upgrade feature. The system upgrade mechanism accepts unsigned .img files, which can be modified to include malicious scripts within the upgrade.sh or disk image components. These modified upgrade images are not validated for authenticity or integrity, and are executed by the system post-upload, enabling root access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gfi:kerio_control:9.4.5:-:*:*:*:*:*:*

History

17 Sep 2025, 13:41

Type Values Removed Values Added
References () https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/ - () https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/ - Exploit, Third Party Advisory
References () https://vulncheck.com/advisories/gfi-kerio-control-auth-bypass-rce - () https://vulncheck.com/advisories/gfi-kerio-control-auth-bypass-rce - Third Party Advisory
CPE cpe:2.3:a:gfi:kerio_control:9.4.5:-:*:*:*:*:*:*
First Time Gfi kerio Control
Gfi
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

03 Jul 2025, 15:13

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-02 14:15

Updated : 2025-09-17 13:41


NVD link : CVE-2025-34071

Mitre link : CVE-2025-34071

CVE.ORG link : CVE-2025-34071


JSON object : View

Products Affected

gfi

  • kerio_control
CWE
CWE-306

Missing Authentication for Critical Function