Under certain circumstances a successful exploitation could result in access to the device.
Advisories

No advisories yet.

Fixes

Solution

* Upgrade iSTAR Ultra, iSTAR Ultra SE to version 6.9.7.CU01 or greater. * Upgrade iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 to version 6.9.3 or greater


Workaround

No workaround given by the vendor.

History

Wed, 24 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device Under certain circumstances a successful exploitation could result in access to the device.

Wed, 24 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
Description Under certain circumstances the web application may allow an authenticated attacker to gain privileged access ('root' user) to the device
Title iSTAR Ultra, Ultra SE, Ultra G2, Ultra G2 SE, iSTAR Edge G2 - Authenticated web application command injection - getOptionsInfo
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-24T16:21:31.227Z

Reserved: 2025-04-17T20:07:25.122Z

Link: CVE-2025-43875

cve-icon Vulnrichment

Updated: 2025-12-24T16:21:26.773Z

cve-icon NVD

Status : Received

Published: 2025-12-24T16:15:48.070

Modified: 2025-12-24T16:15:48.070

Link: CVE-2025-43875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses