CVE-2025-58096

When · When Multiple Products

A high-severity vulnerability has been discovered in multiple products from the vendor "When".

Executive summary

A high-severity vulnerability has been discovered in multiple products from the vendor "When". This flaw allows a remote attacker to potentially execute arbitrary code on the affected server by sending a specially crafted request that improperly handles a specific database variable, leading to a complete system compromise. Organizations are urged to apply the vendor-provided security updates immediately to prevent potential data breaches, service disruptions, and unauthorized access to sensitive systems.

Vulnerability

The vulnerability exists due to improper input validation when processing the database variable tm. An unauthenticated remote attacker can send a malicious, specially crafted request to an application endpoint that interacts with this variable. The application fails to properly sanitize the data associated with the tm variable, leading to a command injection or buffer overflow condition, which can be leveraged by the attacker to execute arbitrary code on the underlying operating system with the privileges of the application service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a complete compromise of the affected server, allowing an attacker to steal sensitive data, install malware, disrupt business operations, or use the compromised system as a pivot point to attack other internal network resources. The potential consequences include significant financial loss, reputational damage, and regulatory penalties related to data breaches.

Remediation

Immediate Action: Apply the security updates provided by the vendor across all affected systems immediately. After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and thoroughly review historical access logs for indicators of compromise that may have occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unusual processes spawned by the application, unexpected outbound network connections, anomalous database queries, and specific error signatures in application and system logs that could indicate exploitation attempts. Utilize intrusion detection systems (IDS) and security information and event management (SIEM) platforms to create alerts for suspicious activity related to the affected products.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk of exploitation. This includes deploying a Web Application Firewall (WAF) with rules specifically designed to block the malicious request patterns associated with this vulnerability. Additionally, restrict network access to the vulnerable application interfaces to only trusted IP addresses and consider placing the affected systems in a segmented network zone.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 7.5 and the potential for complete system compromise, this vulnerability poses a significant risk to the organization. We strongly recommend that all affected systems are patched on an emergency basis. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime target for future exploitation. Prioritize the deployment of vendor patches and implement proactive monitoring to ensure the integrity of your environment.