Metrics
Affected Vendors & Products
Solution
Kaleris recommends users to implement the following versions or later: * Navis N4: Version 3.1.44+ * Navis N4: Version 3.2.26+ * Navis N4: Version 3.3.27+ * Navis N4: Version 3.4.25+ * Navis N4: Version 3.5.18+ * Navis N4: Version 3.6.14+ * Navis N4: Version 3.7.0+ * Navis N4: Version 3.8.0+ If users are unable to update, Kaleris recommends following these mitigations: * If N4 does not need to be exposed to the internet, placing it behind a firewall. * If CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: "url-pattern*.jnlp</url-pattern" and "url-pattern/ulc</url-pattern" * The Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server. * If the Ultra Light Client must be exposed to the Internet, do one of the following: a. Set up a secure VPN connection to allow access for known external parties. b. Set up an authenticated jump system (Citrix, VDI, Etc.). c. Whitelist external allowed IPs. (least secure option) * Additionally, the following controls should be applied: a. Restrict the number of N4 nodes exposed to the internet. b. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer. c. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions. * Users are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users. * A final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI. Kaleris has sent a security advisory to all customers running Kaleris software. For more information, users should email security@kaleris.com
Workaround
No workaround given by the vendor.
Tue, 24 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server. | |
Title | Deserialization of Untrusted Data in Kaleris Navis N4 | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-06-24T18:47:46.713Z
Reserved: 2025-03-20T16:48:15.650Z
Link: CVE-2025-2566

Updated: 2025-06-24T18:47:42.879Z

Status : Awaiting Analysis
Published: 2025-06-24T19:15:23.520
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-2566

No data.

No data.