← Zuruck zu CVEs
CVE-2025-27920
HIGHCISA KEV7.2
Beschreibung
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
CVE Details
CVSS v3.1 Bewertung7.2
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht5/5/2025
Zuletzt geandert11/5/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerSrimax
ProduktOutput Messenger
SchwachstellennameSrimax Output Messenger Directory Traversal Vulnerability
KEV Aufnahmedatum2025-05-19
Behebungsfrist2025-06-09
Ransomware-NutzungUnknown
Betroffene Produkte
srimax:output_messenger
Schwachen (CWE)
CWE-24
Referenzen
https://www.outputmessenger.com/cve-2025-27920/(cve@mitre.org)
https://www.srimax.com/products-2/output-messenger/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.