PatchSiren cyber security CVE debrief
CVE-2025-1265 Elseta CVE debrief
CVE-2025-1265 affects Elseta Vinci Protocol Analyzer versions before 3.2.3.19. CISA describes the issue as an OS command injection vulnerability that could let an attacker escalate privileges and achieve code execution on the affected system. The advisory rates the flaw critical, and the supplied CVSS vector indicates network attack conditions with low privileges required.
- Vendor
- Elseta
- Product
- Vinci Protocol Analyzer
- CVSS
- CRITICAL 9.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-18
- Original CVE updated
- 2025-02-18
- Advisory published
- 2025-02-18
- Advisory updated
- 2025-02-18
Who should care
Organizations running Elseta Vinci Protocol Analyzer, especially OT/ICS operators, plant engineers, system administrators, vulnerability management teams, and incident responders responsible for industrial control environments.
Technical summary
The CISA CSAF advisory identifies an OS command injection vulnerability in Elseta Vinci Protocol Analyzer, affecting product versions <3.2.3.19. The supplied CVSS 3.1 vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, which aligns with a high-severity issue that can impact confidentiality, integrity, and availability. The vendor remediation is to update to version 3.2.3.19 or later.
Defensive priority
Immediate / critical
Recommended defensive actions
- Upgrade Elseta Vinci Protocol Analyzer to version 3.2.3.19 or later as soon as possible.
- Inventory deployments to confirm whether any systems are running affected versions before applying remediation.
- Limit network exposure to the analyzer and restrict access to trusted administrative hosts and users.
- Apply least-privilege access controls for accounts that can manage or interact with the software.
- Review logs and system activity for unexpected command execution, privilege changes, or other signs of compromise.
- Coordinate with Elseta support if upgrade planning, compatibility, or recovery assistance is needed.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-051-06 and its product tree, which identify Elseta Vinci Protocol Analyzer versions <3.2.3.19 as affected by an OS command injection vulnerability. The advisory states the impact may include privilege escalation and code execution. The supplied CVSS 3.1 vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, supporting a critical defensive posture. Remediation guidance in the CSAF points users to version 3.2.3.19 or later.
Official resources
-
CVE-2025-1265 CVE record
CVE.org
-
CVE-2025-1265 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory and the CVE record on 2025-02-18T07:00:00.000Z; the supplied source data shows the same date for initial publication and modification. No KEV entry is provided in the supplied corpus.