PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-1265 Elseta CVE debrief

CVE-2025-1265 affects Elseta Vinci Protocol Analyzer versions before 3.2.3.19. CISA describes the issue as an OS command injection vulnerability that could let an attacker escalate privileges and achieve code execution on the affected system. The advisory rates the flaw critical, and the supplied CVSS vector indicates network attack conditions with low privileges required.

Vendor
Elseta
Product
Vinci Protocol Analyzer
CVSS
CRITICAL 9.9
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-18
Original CVE updated
2025-02-18
Advisory published
2025-02-18
Advisory updated
2025-02-18

Who should care

Organizations running Elseta Vinci Protocol Analyzer, especially OT/ICS operators, plant engineers, system administrators, vulnerability management teams, and incident responders responsible for industrial control environments.

Technical summary

The CISA CSAF advisory identifies an OS command injection vulnerability in Elseta Vinci Protocol Analyzer, affecting product versions <3.2.3.19. The supplied CVSS 3.1 vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, which aligns with a high-severity issue that can impact confidentiality, integrity, and availability. The vendor remediation is to update to version 3.2.3.19 or later.

Defensive priority

Immediate / critical

Recommended defensive actions

  • Upgrade Elseta Vinci Protocol Analyzer to version 3.2.3.19 or later as soon as possible.
  • Inventory deployments to confirm whether any systems are running affected versions before applying remediation.
  • Limit network exposure to the analyzer and restrict access to trusted administrative hosts and users.
  • Apply least-privilege access controls for accounts that can manage or interact with the software.
  • Review logs and system activity for unexpected command execution, privilege changes, or other signs of compromise.
  • Coordinate with Elseta support if upgrade planning, compatibility, or recovery assistance is needed.

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-25-051-06 and its product tree, which identify Elseta Vinci Protocol Analyzer versions <3.2.3.19 as affected by an OS command injection vulnerability. The advisory states the impact may include privilege escalation and code execution. The supplied CVSS 3.1 vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, supporting a critical defensive posture. Remediation guidance in the CSAF points users to version 3.2.3.19 or later.

Official resources

CISA published the advisory and the CVE record on 2025-02-18T07:00:00.000Z; the supplied source data shows the same date for initial publication and modification. No KEV entry is provided in the supplied corpus.