In DOXENSE WATCHDOC before 6.1.1.5332, Deserialization of Untrusted Data can lead to remote code execution through the .NET Remoting library in the Watchdoc administration interface.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 26 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Description In DOXENSE WATCHDOC before 6.1.1.5332, Deserialization of Untrusted Data can lead to remote code execution through the .NET Remoting library in the Watchdoc administration interface.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-26T18:40:58.386Z

Reserved: 2025-08-29T00:00:00.000Z

Link: CVE-2025-58384

cve-icon Vulnrichment

Updated: 2025-09-26T18:40:27.167Z

cve-icon NVD

Status : Received

Published: 2025-09-26T18:15:37.647

Modified: 2025-09-26T19:15:37.030

Link: CVE-2025-58384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.