Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2025-3424", "assignerOrgId": "20705f08-db8b-4497-8f94-7eea62317651", "state": "PUBLISHED", "assignerShortName": "Philips", "dateReserved": "2025-04-07T15:05:10.307Z", "datePublished": "2025-04-07T15:36:46.060Z", "dateUpdated": "2025-04-10T15:42:10.381Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "modules": ["filesystem"], "platforms": ["Windows"], "product": "IntelliSpace Portal", "vendor": "Philips", "versions": [{"status": "affected", "version": "12 and prior"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Victor A Morales"}, {"lang": "en", "type": "finder", "value": "Omar A Crespo"}], "datePublic": "2025-04-07T15:05:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>The IntelliSpace portal application utilizes .NET\nRemoting for its functionality. The vulnerability arises from the exploitation\nof port 755 through the \"Object Marshalling\" technique, which allows\nan attacker to read internal files without any authentication. This is possible\nby crafting specific .NET Remoting URLs derived from information enumerated in\nthe client-side configuration files.</p>\n\n\n\n\n\n<p>This issue affects IntelliSpace Portal: 12 and prior.</p>"}], "value": "The IntelliSpace portal application utilizes .NET\nRemoting for its functionality. The vulnerability arises from the exploitation\nof port 755 through the \"Object Marshalling\" technique, which allows\nan attacker to read internal files without any authentication. This is possible\nby crafting specific .NET Remoting URLs derived from information enumerated in\nthe client-side configuration files.\n\n\n\n\n\n\n\nThis issue affects IntelliSpace Portal: 12 and prior."}], "impacts": [{"capecId": "CAPEC-126", "descriptions": [{"lang": "en", "value": "CAPEC-126 Path Traversal"}]}], "metrics": [{"cvssV4_0": {"Automatable": "YES", "Recovery": "USER", "Safety": "PRESENT", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "ADJACENT", "baseScore": 7.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "GREEN", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:M/U:Green", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "20705f08-db8b-4497-8f94-7eea62317651", "shortName": "Philips", "dateUpdated": "2025-04-10T15:42:10.381Z"}, "references": [{"url": "https://www.cve.org/CVERecord?id=CVE-2025-3424"}, {"url": "https://www.philips.com/a-w/security/security-advisories.html#security_advisories"}], "source": {"discovery": "EXTERNAL"}, "title": "3.2.1 Arbitrary File Read in insecure .NET Remoting TCP Channel", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-07T16:11:37.059479Z", "id": "CVE-2025-3424", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-07T16:11:44.627Z"}}]}}