Under certain circumstances a successful exploitation could result in access to the device.
History

Wed, 24 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device Under certain circumstances a successful exploitation could result in access to the device.

Wed, 24 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
Description Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device
Title iSTAR Ultra, Ultra SE, Ultra G2, Ultra G2 SE, iSTAR Edge G2 - Authenticated web application command injection - getOptionsInfo
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-24T16:21:31.227Z

Reserved: 2025-04-17T20:07:25.122Z

Link: CVE-2025-43875

cve-icon Vulnrichment

Updated: 2025-12-24T16:21:26.773Z

cve-icon NVD

Status : Received

Published: 2025-12-24T16:15:48.070

Modified: 2025-12-24T16:15:48.070

Link: CVE-2025-43875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.