← Volver a CVEs
CVE-2025-27920
HIGHCISA KEV7.2
Descripcion
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Detalles CVE
Puntuacion CVSS v3.17.2
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/5/2025
Ultima modificacion11/5/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorSrimax
ProductoOutput Messenger
Nombre vulnerabilidadSrimax Output Messenger Directory Traversal Vulnerability
Fecha inclusion KEV2025-05-19
Fecha limite remediacion2025-06-09
Uso en ransomwareUnknown
Productos afectados
srimax:output_messenger
Debilidades (CWE)
CWE-24
Referencias
https://www.outputmessenger.com/cve-2025-27920/(cve@mitre.org)
https://www.srimax.com/products-2/output-messenger/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.