Description
Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server.
Published: 2025-06-24
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Kaleris recommends users to implement the following versions or later: * Navis N4: Version 3.1.44+ * Navis N4: Version 3.2.26+ * Navis N4: Version 3.3.27+ * Navis N4: Version 3.4.25+ * Navis N4: Version 3.5.18+ * Navis N4: Version 3.6.14+ * Navis N4: Version 3.7.0+ * Navis N4: Version 3.8.0+ If users are unable to update, Kaleris recommends following these mitigations: * If N4 does not need to be exposed to the internet, placing it behind a firewall. * If CAP needs to be exposed to the internet, disable the Ultra Light Client on the nodes being exposed. This can be done by blocking the Ultra Light Client URLs in the load balancer or firewall by blocking the following patterns: "url-pattern*.jnlp</url-pattern" and "url-pattern/ulc</url-pattern" * The Ultra Light Client endpoint can also be disabled on the N4 Cluster node by commenting out relevant code in the web.xml file and restarting the server. * If the Ultra Light Client must be exposed to the Internet, do one of the following: a. Set up a secure VPN connection to allow access for known external parties. b. Set up an authenticated jump system (Citrix, VDI, Etc.). c. Whitelist external allowed IPs. (least secure option) * Additionally, the following controls should be applied: a. Restrict the number of N4 nodes exposed to the internet. b. Ensure that HTTPS is enabled and configured on the filewall/loadbalancer. c. Use a reliable third-party party firewall with built in DDOS protection that can detect unwanted intrusions. * Users are required to implement TLS in their load balancer. The setup for this is included in the Application Security Guide that is provided to all users. * A final option to consider is upgrading to N4 4.0, where the Ultra Light Client has been fully replaced with the HTML UI. Kaleris has sent a security advisory to all customers running Kaleris software. For more information, users should email security@kaleris.com

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19054 Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server.
History

Tue, 24 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
Description Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserialization vulnerability. An unauthenticated attacker can make specially crafted requests to execute arbitrary code on the server.
Title Deserialization of Untrusted Data in Kaleris Navis N4
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-24T18:47:46.713Z

Reserved: 2025-03-20T16:48:15.650Z

Link: CVE-2025-2566

cve-icon Vulnrichment

Updated: 2025-06-24T18:47:42.879Z

cve-icon NVD

Status : Deferred

Published: 2025-06-24T19:15:23.520

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses