Metrics
Affected Vendors & Products
No advisories yet.
Solution
IDIS recommends users to follow these guidelines: * For users who continue to use the ICM Viewer: * You must access https://icm.idisglobal.com https://icm.idisglobal.com/ and follow the instructions provided to upgrade to version v1.7.1. IDIS requires all users to upgrade to v1.7.1. Failure to do so will render the ICM Viewer unusable. * For users who do not use the ICM Viewer: * You must immediately uninstall the program from your system.
Workaround
No workaround given by the vendor.
Thu, 06 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Idis
Idis icm Viewer |
|
| Vendors & Products |
Idis
Idis icm Viewer |
Thu, 06 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine. | |
| Title | IDIS ICM Viewer Argument Injection | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-06T15:47:08.878Z
Reserved: 2025-10-31T16:30:47.318Z
Link: CVE-2025-12556
Updated: 2025-11-06T15:45:41.097Z
Status : Awaiting Analysis
Published: 2025-11-06T16:15:48.910
Modified: 2025-11-06T19:45:09.883
Link: CVE-2025-12556
No data.
OpenCVE Enrichment
Updated: 2025-11-06T20:38:32Z