Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server.
Fixes

Solution

Kaleris recommends users to implement the following versions or later: * Navis N4: Version 3.1.44+ * Navis N4: Version 3.2.26+ * Navis N4: Version 3.3.27+ * Navis N4: Version 3.4.25+ * Navis N4: Version 3.5.18+ * Navis N4: Version 3.6.14+ * Navis N4: Version 3.7.0+ * Navis N4: Version 3.8.0+ If users are unable to update, Kaleris recommends following these mitigations: * If N4 does not need to be exposed to the internet, placing it behind a firewall. * If CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: "url-pattern*.jnlp</url-pattern" and "url-pattern/ulc</url-pattern" * The Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server. * If the Ultra Light Client must be exposed to the Internet, do one of the following: a. Set up a secure VPN connection to allow access for known external parties. b. Set up an authenticated jump system (Citrix, VDI, Etc.). c. Whitelist external allowed IPs. (least secure option) * Additionally, the following controls should be applied: a. Restrict the number of N4 nodes exposed to the internet. b. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer. c. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions. * Users are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users. * A final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI. Kaleris has sent a security advisory to all customers running Kaleris software. For more information, users should email security@kaleris.com


Workaround

No workaround given by the vendor.

History

Tue, 24 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
Description Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server.
Title Deserialization of Untrusted Data in Kaleris Navis N4
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-24T18:47:46.713Z

Reserved: 2025-03-20T16:48:15.650Z

Link: CVE-2025-2566

cve-icon Vulnrichment

Updated: 2025-06-24T18:47:42.879Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-24T19:15:23.520

Modified: 2025-06-26T18:58:14.280

Link: CVE-2025-2566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.