CVE-2025-64062
Primakon · Primakon Multiple Products
A high-severity vulnerability has been identified in multiple Primakon products, specifically affecting the Pi Portal.
Executive summary
A high-severity vulnerability has been identified in multiple Primakon products, specifically affecting the Pi Portal. This flaw could allow a remote, unauthenticated attacker to execute arbitrary code on the affected system, potentially leading to a complete system compromise, data theft, and significant service disruption. Immediate patching is required to mitigate this critical risk.
Vulnerability
This vulnerability is a remote code execution (RCE) flaw within the Primakon Pi Portal. The weakness stems from insufficient input validation in a core component of the portal's web interface. An unauthenticated attacker can exploit this by sending a specially crafted network request to a vulnerable endpoint, which allows them to inject and execute arbitrary commands with the privileges of the web service account on the underlying server.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could result in a complete compromise of the confidentiality, integrity, and availability of the affected server. The business impact includes the potential for significant data breaches, theft of sensitive corporate or customer information, service outages, and reputational damage. An attacker could also leverage the compromised system as a foothold to move laterally within the network, escalating the scope of the breach.
Remediation
Immediate Action: Apply the security updates released by Primakon to all affected systems immediately. Following the patch deployment, it is crucial to review system, application, and web server access logs for any anomalous activity or indicators of compromise that may have occurred prior to patching.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes looking for unusual outbound network connections from servers hosting the Pi Portal, inspecting web server logs for malicious request patterns or command injection syntax, and setting up alerts for abnormal CPU or memory utilization on affected assets.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the Pi Portal to only trusted IP ranges and place the application behind a Web Application Firewall (WAF) with rules designed to detect and block command injection attempts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability poses a critical and immediate threat to the organization. Based on the CVSS score of 8.8 and the risk of unauthenticated remote code execution, this issue must be treated as a top priority. While CVE-2025-64062 is not yet on the CISA KEV list, its severity warrants urgent action. We strongly recommend that the vendor-provided security updates are deployed across all affected systems without delay to prevent potential compromise.