An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Title Improper input validation in
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published: 2025-02-24T16:27:46.924Z

Updated: 2025-03-03T19:12:12.175Z

Reserved: 2025-01-07T09:41:16.734Z

Link: CVE-2025-22495

cve-icon Vulnrichment

Updated: 2025-03-03T19:12:08.038Z

cve-icon NVD

Status : Received

Published: 2025-02-24T17:15:13.723

Modified: 2025-02-24T17:15:13.723

Link: CVE-2025-22495

cve-icon Redhat

No data.