An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.
Advisories

No advisories yet.

Fixes

Solution

IDIS recommends users to follow these guidelines: * For users who continue to use the ICM Viewer: * You must access https://icm.idisglobal.com https://icm.idisglobal.com/  and follow the instructions provided to upgrade to version v1.7.1. IDIS requires all users to upgrade to v1.7.1. Failure to do so will render the ICM Viewer unusable. * For users who do not use the ICM Viewer: * You must immediately uninstall the program from your system.


Workaround

No workaround given by the vendor.

History

Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Idis
Idis icm Viewer
Vendors & Products Idis
Idis icm Viewer

Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 15:45:00 +0000

Type Values Removed Values Added
Description An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.
Title IDIS ICM Viewer Argument Injection
Weaknesses CWE-88
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-06T15:47:08.878Z

Reserved: 2025-10-31T16:30:47.318Z

Link: CVE-2025-12556

cve-icon Vulnrichment

Updated: 2025-11-06T15:45:41.097Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-06T16:15:48.910

Modified: 2025-11-06T19:45:09.883

Link: CVE-2025-12556

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-06T20:38:32Z