CVE-2025-9972
N-Partner · N-Partner N-Reporter, N-Cloud, and N-Probe
A critical OS Command Injection vulnerability has been discovered in N-Partner's N-Reporter, N-Cloud, and N-Probe products.
Executive summary
A critical OS Command Injection vulnerability has been discovered in N-Partner's N-Reporter, N-Cloud, and N-Probe products. This flaw allows an authenticated remote attacker to execute arbitrary commands on the underlying operating system, which can lead to a complete system compromise, data theft, and further network intrusion.
Vulnerability
This vulnerability is an OS Command Injection flaw. It exists because the application fails to properly sanitize or validate user-supplied input before passing it to a system shell for execution. An authenticated attacker can exploit this by crafting a request containing malicious OS commands, which are then executed with the privileges of the application's service account, potentially leading to a full system takeover.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could result in the complete compromise of the affected N-Partner appliances, granting an attacker full control over the system. Potential consequences include unauthorized access to sensitive network monitoring data, data exfiltration, lateral movement into the broader corporate network, deployment of ransomware, and a complete loss of network visibility and reporting capabilities, severely impacting security and operational oversight.
Remediation
Immediate Action: Organizations must immediately update all affected N-Partner N-Reporter, N-Cloud, and N-Probe instances to the latest patched version as recommended by the vendor. After patching, review system and application access logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes looking for unusual process execution chains originating from the N-Partner application's user account in system logs, unexpected outbound network connections from the affected servers, and web access logs showing requests with special characters or command syntax (e.g., ;, |, &&, $(...)).
Compensating Controls: If immediate patching is not feasible, apply temporary mitigating controls. Restrict network access to the management interfaces of the affected products to a minimal set of trusted IP addresses using a firewall. If possible, deploy a Web Application Firewall (WAF) with rules designed to detect and block common OS command injection attack patterns.
Exploitation status
Public Exploit Available: False (as of Sep 17, 2025)
Analyst recommendation
Given the critical CVSS score of 9.8, this vulnerability poses an immediate and severe risk to the organization. We strongly recommend that all affected N-Partner products be patched immediately, prioritizing internet-facing systems. Although this CVE is not currently on the CISA KEV list, its high severity warrants urgent attention. Organizations should assume it will be actively exploited and take proactive steps to remediate and monitor for any related malicious activity.