CVE-2025-64129

Zenitel · Zenitel Multiple Products

A high-severity vulnerability has been identified in multiple Zenitel products, including the TCIV-3+ model.

Executive summary

A high-severity vulnerability has been identified in multiple Zenitel products, including the TCIV-3+ model. This flaw, an out-of-bounds write, can be exploited by a remote, unauthenticated attacker to cause the affected device to crash, resulting in a denial-of-service condition that disrupts communication and security functions.

Vulnerability

The vulnerability is an out-of-bounds write. This occurs when the software attempts to write data beyond the boundaries of its intended memory buffer. A remote attacker can trigger this flaw by sending a specially crafted network packet to the device, causing it to write data into an incorrect memory location, which corrupts critical data structures and leads to an immediate system crash and denial of service.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.6. Successful exploitation would result in a denial-of-service attack, rendering the Zenitel device inoperable until it is manually rebooted. Given that Zenitel products are often deployed in critical security and communication systems (e.g., intercoms, access control, public address), the business impact includes loss of security monitoring, failure of emergency communication channels, and potential disruption to physical access control systems, thereby posing a direct risk to organizational safety and security operations.

Remediation

Immediate Action: Apply vendor-supplied security updates immediately to patch the vulnerability. Concurrently, security teams should actively monitor for any signs of exploitation attempts and conduct a thorough review of system and network access logs for anomalous activity targeting the affected devices.

Proactive Monitoring: Monitor for unexpected device reboots or service crashes in system logs. Network administrators should watch for unusual or malformed traffic patterns directed at the management interfaces of Zenitel devices. Implement and monitor signatures for this specific CVE on Intrusion Detection/Prevention Systems (IDS/IPS) as they become available.

Compensating Controls: If immediate patching is not feasible, restrict network access to the devices to a dedicated and trusted management network. Implement strict firewall rules to allow traffic only from authorized IP addresses. Deploy an Intrusion Prevention System (IPS) with rules to detect and block traffic patterns associated with this exploit vector.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.6) and the critical function of these devices in security infrastructure, immediate action is required. We strongly recommend that organizations prioritize the deployment of the vendor-provided security updates across all affected Zenitel assets. Although this CVE is not currently on the CISA KEV list, its potential to cause significant operational disruption warrants urgent attention. Implementing the recommended compensating controls will provide an additional layer of defense while the patching process is underway.