CVE-2025-13706
Tencent · Tencent Multiple Products
A high-severity remote code execution vulnerability has been identified in multiple Tencent products.
Executive summary
A high-severity remote code execution vulnerability has been identified in multiple Tencent products. An unauthenticated attacker could exploit this flaw to take complete control of an affected system, leading to potential data theft, service disruption, and further network compromise. Organizations are urged to apply the vendor-provided security patches immediately to mitigate this critical risk.
Vulnerability
This vulnerability is a Deserialization of Untrusted Data flaw within the merge_checkpoint function of the Tencent PatrickStar component. An unauthenticated remote attacker can send a specially crafted serialized data payload to the affected function. When the application deserializes this malicious payload, it can trigger the execution of arbitrary code with the permissions of the running application process, leading to a full system compromise.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could have a significant negative impact on the business. An attacker achieving remote code execution can gain complete control over the affected server, allowing them to steal sensitive corporate or customer data, install persistent malware such as ransomware, disrupt critical services, or use the compromised system as a pivot point to attack other internal network resources. The potential consequences include major data breaches, financial loss, operational downtime, and severe reputational damage.
Remediation
Immediate Action: Apply the security patches released by Tencent immediately, prioritizing all internet-facing systems. After patching, monitor systems for any signs of post-remediation exploitation attempts and review historical access logs for indicators of compromise related to the merge_checkpoint function.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Look for unusual or malformed requests to the merge_checkpoint function in web server and application logs. Monitor for unexpected process creation originating from the application, anomalous outbound network connections, and any unauthorized file modifications.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
- Deploy a Web Application Firewall (WAF) with rules specifically designed to inspect and block malicious serialized objects targeting the vulnerable function.
- Restrict network access to the affected application or service, allowing connections only from trusted IP addresses.
- Run the application with the lowest possible user privileges to limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.8) and the potential for complete system compromise, we strongly recommend that organizations prioritize the immediate application of vendor-supplied patches. All internet-facing systems running the affected Tencent products should be considered at extreme risk. Although this vulnerability is not yet known to be actively exploited in the wild, its critical nature means that proactive remediation is essential to prevent future attacks. Organizations must act swiftly to implement the remediation plan and mitigate the significant security risk this vulnerability presents.