CVE-2025-5087 (GCVE-0-2025-5087)
Vulnerability from cvelistv5
Published
2025-06-24 18:30
Modified
2025-06-24 18:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-319 - Cleartext Transmission of Sensitive Information
Summary
Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-5087",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-24T18:46:10.854937Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-24T18:46:31.376Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Navis N4",
"vendor": "Kaleris",
"versions": [
{
"lessThan": "4.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-06-24T18:23:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003eKaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.\u003c/p\u003e"
}
],
"value": "Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-319",
"description": "CWE-319 Cleartext Transmission of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-24T18:30:40.700Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-01"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eKaleris recommends users to implement the following versions or later:\u003c/p\u003e\u003cul\u003e\u003cli\u003eNavis N4: Version 3.1.44+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.2.26+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.3.27+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.4.25+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.5.18+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.6.14+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.7.0+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.8.0+\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eIf users are unable to update, Kaleris recommends following these mitigations:\u003c/p\u003e\u003cul\u003e\u003cli\u003eIf N4 does not need to be exposed to the internet, placing it behind a firewall.\u003c/li\u003e\u003cli\u003eIf CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: \"url-pattern*.jnlp\u0026lt;/url-pattern\" and \"url-pattern/ulc\u0026lt;/url-pattern\"\u003c/li\u003e\u003cli\u003eThe Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server.\u003c/li\u003e\u003cli\u003eIf the Ultra Light Client must be exposed to the Internet, do one of the following:\u003cbr\u003ea. Set up a secure VPN connection to allow access for known external parties.\u003cbr\u003eb. Set up an authenticated jump system (Citrix, VDI, Etc.).\u003cbr\u003ec. Whitelist external allowed IPs. (least secure option)\u003c/li\u003e\u003cli\u003eAdditionally, the following controls should be applied:\u003cbr\u003ea. Restrict the number of N4 nodes exposed to the internet.\u003cbr\u003eb. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer.\u003cbr\u003ec. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions.\u003c/li\u003e\u003cli\u003eUsers are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users.\u003c/li\u003e\u003cli\u003eA final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eKaleris has sent a security advisory to all customers running Kaleris software.\u003c/p\u003e\u003cp\u003eFor more information, users should email \u003ca target=\"_blank\" rel=\"nofollow\"\u003esecurity@kaleris.com\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Kaleris recommends users to implement the following versions or later:\n\n * Navis N4: Version 3.1.44+\n * Navis N4: Version 3.2.26+\n * Navis N4: Version 3.3.27+\n * Navis N4: Version 3.4.25+\n * Navis N4: Version 3.5.18+\n * Navis N4: Version 3.6.14+\n * Navis N4: Version 3.7.0+\n * Navis N4: Version 3.8.0+\n\n\nIf users are unable to update, Kaleris recommends following these mitigations:\n\n * If N4 does not need to be exposed to the internet, placing it behind a firewall.\n * If CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: \"url-pattern*.jnlp\u003c/url-pattern\" and \"url-pattern/ulc\u003c/url-pattern\"\n * The Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server.\n * If the Ultra Light Client must be exposed to the Internet, do one of the following:\na. Set up a secure VPN connection to allow access for known external parties.\nb. Set up an authenticated jump system (Citrix, VDI, Etc.).\nc. Whitelist external allowed IPs. (least secure option)\n * Additionally, the following controls should be applied:\na. Restrict the number of N4 nodes exposed to the internet.\nb. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer.\nc. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions.\n * Users are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users.\n * A final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI.\n\n\nKaleris has sent a security advisory to all customers running Kaleris software.\n\nFor more information, users should email security@kaleris.com"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Cleartext Transmission of Sensitive Information in Kaleris Navis N4",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-5087",
"datePublished": "2025-06-24T18:30:40.700Z",
"dateReserved": "2025-05-22T15:55:28.362Z",
"dateUpdated": "2025-06-24T18:46:31.376Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-5087\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2025-06-24T19:15:23.757\",\"lastModified\":\"2025-06-26T18:58:14.280\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.\"},{\"lang\":\"es\",\"value\":\"Kaleris NAVIS N4 ULC (Cliente Ultraligero) se comunica de forma insegura mediante datos comprimidos con zlib a trav\u00e9s de HTTP. Un atacante capaz de observar el tr\u00e1fico de red entre los Clientes Ultraligeros y los servidores N4 podr\u00eda extraer informaci\u00f3n confidencial, incluidas credenciales en texto plano.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-01\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-5087\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-24T18:46:10.854937Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-24T18:46:26.891Z\"}}], \"cna\": {\"title\": \"Cleartext Transmission of Sensitive Information in Kaleris Navis N4\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Kaleris\", \"product\": \"Navis N4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Kaleris recommends users to implement the following versions or later:\\n\\n * Navis N4: Version 3.1.44+\\n * Navis N4: Version 3.2.26+\\n * Navis N4: Version 3.3.27+\\n * Navis N4: Version 3.4.25+\\n * Navis N4: Version 3.5.18+\\n * Navis N4: Version 3.6.14+\\n * Navis N4: Version 3.7.0+\\n * Navis N4: Version 3.8.0+\\n\\n\\nIf users are unable to update, Kaleris recommends following these mitigations:\\n\\n * If N4 does not need to be exposed to the internet, placing it behind a firewall.\\n * If CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: \\\"url-pattern*.jnlp\u003c/url-pattern\\\" and \\\"url-pattern/ulc\u003c/url-pattern\\\"\\n * The Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server.\\n * If the Ultra Light Client must be exposed to the Internet, do one of the following:\\na. Set up a secure VPN connection to allow access for known external parties.\\nb. Set up an authenticated jump system (Citrix, VDI, Etc.).\\nc. Whitelist external allowed IPs. (least secure option)\\n * Additionally, the following controls should be applied:\\na. Restrict the number of N4 nodes exposed to the internet.\\nb. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer.\\nc. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions.\\n * Users are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users.\\n * A final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI.\\n\\n\\nKaleris has sent a security advisory to all customers running Kaleris software.\\n\\nFor more information, users should email security@kaleris.com\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eKaleris recommends users to implement the following versions or later:\u003c/p\u003e\u003cul\u003e\u003cli\u003eNavis N4: Version 3.1.44+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.2.26+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.3.27+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.4.25+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.5.18+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.6.14+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.7.0+\u003c/li\u003e\u003cli\u003eNavis N4: Version 3.8.0+\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eIf users are unable to update, Kaleris recommends following these mitigations:\u003c/p\u003e\u003cul\u003e\u003cli\u003eIf N4 does not need to be exposed to the internet, placing it behind a firewall.\u003c/li\u003e\u003cli\u003eIf CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: \\\"url-pattern*.jnlp\u0026lt;/url-pattern\\\" and \\\"url-pattern/ulc\u0026lt;/url-pattern\\\"\u003c/li\u003e\u003cli\u003eThe Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server.\u003c/li\u003e\u003cli\u003eIf the Ultra Light Client must be exposed to the Internet, do one of the following:\u003cbr\u003ea. Set up a secure VPN connection to allow access for known external parties.\u003cbr\u003eb. Set up an authenticated jump system (Citrix, VDI, Etc.).\u003cbr\u003ec. Whitelist external allowed IPs. (least secure option)\u003c/li\u003e\u003cli\u003eAdditionally, the following controls should be applied:\u003cbr\u003ea. Restrict the number of N4 nodes exposed to the internet.\u003cbr\u003eb. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer.\u003cbr\u003ec. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions.\u003c/li\u003e\u003cli\u003eUsers are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users.\u003c/li\u003e\u003cli\u003eA final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eKaleris has sent a security advisory to all customers running Kaleris software.\u003c/p\u003e\u003cp\u003eFor more information, users should email \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\"\u003esecurity@kaleris.com\u003c/a\u003e\u003c/p\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-06-24T18:23:00.000Z\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-01\", \"tags\": [\"government-resource\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003c/p\u003e\\n\\n\u003cp\u003eKaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-319\", \"description\": \"CWE-319 Cleartext Transmission of Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2025-06-24T18:30:40.700Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-5087\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-24T18:46:31.376Z\", \"dateReserved\": \"2025-05-22T15:55:28.362Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2025-06-24T18:30:40.700Z\", \"assignerShortName\": \"icscert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…