Metrics
Affected Vendors & Products
No advisories yet.
Solution
* Upgrade iSTAR Ultra, iSTAR Ultra SE to version 6.9.7.CU01 or greater. * Upgrade iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 to version 6.9.3 or greater
Workaround
No workaround given by the vendor.
Wed, 24 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device | Under certain circumstances a successful exploitation could result in access to the device. |
Wed, 24 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device | |
| Title | iSTAR Ultra, Ultra SE, Ultra G2, Ultra G2 SE, iSTAR Edge G2 - Authenticated web application command injection - getOptionsInfo | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jci
Published:
Updated: 2025-12-24T16:21:31.227Z
Reserved: 2025-04-17T20:07:25.122Z
Link: CVE-2025-43875
Updated: 2025-12-24T16:21:26.773Z
Status : Received
Published: 2025-12-24T16:15:48.070
Modified: 2025-12-24T16:15:48.070
Link: CVE-2025-43875
No data.
OpenCVE Enrichment
No data.