CVE-2025-64130

Zenitel · Zenitel Multiple Products

A critical reflected cross-site scripting (XSS) vulnerability has been identified in multiple Zenitel products.

Executive summary

A critical reflected cross-site scripting (XSS) vulnerability has been identified in multiple Zenitel products. An attacker could exploit this flaw by tricking a user into clicking a malicious link, which would then execute arbitrary code in the victim's browser, potentially leading to session hijacking, data theft, or unauthorized control of the affected device.

Vulnerability

The vulnerability exists within the web interface of the affected Zenitel products, specifically the TCIV-3+ model is mentioned. The application fails to properly sanitize user-supplied input that is reflected back in the HTTP response. An attacker can craft a malicious URL containing JavaScript code and send it to a victim. When the victim clicks this link, the malicious script is sent to the vulnerable application, which then includes it in the web page sent back to the victim's browser, causing the script to execute in the context of the victim's session.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a significant business impact. If an administrative user is targeted, an attacker could steal their session cookies, effectively hijacking their session and gaining full administrative control over the Zenitel device. This could lead to unauthorized configuration changes, service disruption, eavesdropping on communications, or using the compromised device as a pivot point to launch further attacks within the internal network.

Remediation

Immediate Action: Update Zenitel Multiple Products to the latest version. Check the vendor's security advisory for specific patch details and installation instructions. After patching, review access logs for any signs of compromise that may have occurred prior to remediation.

Proactive Monitoring: Monitor web server and firewall logs for unusual GET requests containing script tags (<script>), HTML event handlers (e.g., onerror, onload), or other encoded JavaScript characters within URL parameters. Implement alerts for repeated failed login attempts or access from untrusted IP addresses to the device's management interface, which could indicate post-exploitation activity.

Compensating Controls: If immediate patching is not feasible, implement the following controls:

  • Place a Web Application Firewall (WAF) in front of the device's management interface with rulesets designed to detect and block common XSS attack patterns.
  • Restrict network access to the device's management interface to a dedicated and trusted administrative network segment or specific IP addresses.
  • Increase user awareness training, specifically advising administrators to be cautious of unsolicited links, even if they appear to be from a trusted source.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8, this vulnerability presents a significant risk to the organization. The potential for a remote attacker to gain administrative control over critical communication systems requires immediate attention. We strongly recommend that organizations identify all affected Zenitel devices and apply the vendor-supplied patches on an emergency basis. If patching is delayed, the compensating controls outlined above should be implemented immediately to reduce the attack surface.