diff --git a/2025/1xxx/CVE-2025-1077.json b/2025/1xxx/CVE-2025-1077.json
index 3810c4585c1..c9e54fe7568 100644
--- a/2025/1xxx/CVE-2025-1077.json
+++ b/2025/1xxx/CVE-2025-1077.json
@@ -1,18 +1,205 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1077",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "incident@nbu.gov.sk",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote\u00a0unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
}
]
- }
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-502 Deserialization of Untrusted Data",
+ "cweId": "CWE-502"
+ }
+ ]
+ },
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-20 Improper Input Validation",
+ "cweId": "CWE-20"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "IBL Software Engineering",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Visual Weather",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "8.2.5"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.9"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.6 (Enterprise Build)"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "8.5.2 (Enterprise Build)"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "NAMIS",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "8.2.5"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.9"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.6 (Enterprise Build)"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "8.5.2 (Enterprise Build)"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Aero Weather",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "8.2.5"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.9"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.6 (Enterprise Build)"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "8.5.2 (Enterprise Build)"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Satellite Weather",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "8.2.5"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.9"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "7.3.6 (Enterprise Build)"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "8.5.2 (Enterprise Build)"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://www.iblsoft.com/security/advisory-isec-2024-001/",
+ "refsource": "MISC",
+ "name": "https://www.iblsoft.com/security/advisory-isec-2024-001/"
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.2.0"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "configuration": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled
"
+ }
+ ],
+ "value": "The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled"
+ }
+ ],
+ "work_around": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In order to mitigate the vulnerability:
- Disable PDS pipelines utilizing IPDS pipelines in server configurations.
- Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.
- Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.
It is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines.
"
+ }
+ ],
+ "value": "In order to mitigate the vulnerability:\n-\u00a0Disable PDS pipelines utilizing IPDS pipelines in server configurations.\n-\u00a0Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\n-\u00a0Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\n\nIt is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines."
+ }
+ ],
+ "solution": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).
"
+ }
+ ],
+ "value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Ianis BERNARD (NCIA)"
+ }
+ ]
}
\ No newline at end of file