A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attackers with administrative access to upload and execute arbitrary code through the firmware upgrade feature. The system upgrade mechanism accepts unsigned .img files, which can be modified to include malicious scripts within the upgrade.sh or disk image components. These modified upgrade images are not validated for authenticity or integrity, and are executed by the system post-upload, enabling root access.
References
Link | Resource |
---|---|
https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/gfi-kerio-control-auth-bypass-rce | Third Party Advisory |
Configurations
History
17 Sep 2025, 13:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/ - Exploit, Third Party Advisory | |
References | () https://vulncheck.com/advisories/gfi-kerio-control-auth-bypass-rce - Third Party Advisory | |
CPE | cpe:2.3:a:gfi:kerio_control:9.4.5:-:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Gfi kerio Control
Gfi |
03 Jul 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-02 14:15
Updated : 2025-09-17 13:41
NVD link : CVE-2025-34071
Mitre link : CVE-2025-34071
CVE.ORG link : CVE-2025-34071
JSON object : View
Products Affected
gfi
- kerio_control
CWE
CWE-306
Missing Authentication for Critical Function