Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.
Advisories

No advisories yet.

Fixes

Solution

* Upgrade iSTAR Ultra, iSTAR Ultra SE, iStar Ultra LT to version 6.9.7.CU01 or greater. * Upgrade iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 to version 6.9.3 or greater.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 17 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
Description Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.
Title iSTAR Ultra, Ultra SE, Ultra G2, Ultra G2 SE, iSTAR Edge G2 - Authenticated web application command injection - setFaultDebounce
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-17T16:42:19.977Z

Reserved: 2025-04-17T20:07:25.122Z

Link: CVE-2025-43873

cve-icon Vulnrichment

Updated: 2025-12-17T16:42:15.228Z

cve-icon NVD

Status : Received

Published: 2025-12-17T16:16:05.703

Modified: 2025-12-17T16:16:05.703

Link: CVE-2025-43873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses