PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32011 KUNBUS GmbH CVE debrief

CVE-2025-32011 is a critical remote authentication bypass affecting KUNBUS Revolution Pi PiCtory versions 2.5.0 through 2.11.1. The issue is described in the CISA CSAF advisory as a path traversal condition that can let a remote attacker access the application without valid authentication. CISA published the advisory on 2025-05-01 and updated it on 2025-07-10, noting an additional image release in the mitigation guidance.

Vendor
KUNBUS GmbH
Product
Revolution Pi OS Bookworm
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-01
Original CVE updated
2025-07-10
Advisory published
2025-05-01
Advisory updated
2025-07-10

Who should care

Industrial control system and OT operators using KUNBUS Revolution Pi PiCtory, especially systems running versions 2.5.0 through 2.11.1. Also relevant for administrators, integrators, and anyone responsible for remote access, authentication controls, or patching of Revolution Pi environments.

Technical summary

The source advisory states that KUNBUS PiCtory versions 2.5.0 through 2.11.1 contain an authentication bypass vulnerability caused by path traversal. Because the vulnerability is network-reachable and requires no privileges or user interaction, its attack surface is broad. The advisory’s remediation is to update PiCtory to version 2.12; it also recommends enabling authentication where applicable and notes that a Cockpit-based update path is preferred.

Defensive priority

Immediate

Recommended defensive actions

  • Update KUNBUS PiCtory to version 2.12 as soon as possible.
  • Use KUNBUS Cockpit to apply the update where that is the preferred management path.
  • If immediate patching is not possible, activate authentication as recommended in the vendor remediation guide.
  • Review exposed management interfaces and restrict access to trusted administrative networks only.
  • Validate whether any Revolution Pi deployments are running affected PiCtory versions 2.5.0 through 2.11.1 and prioritize those systems for remediation.

Evidence notes

The debrief is based on the CISA CSAF advisory ICSA-25-121-01 and the linked CVE record. The advisory metadata names KUNBUS PiCtory versions 2.5.0 through 2.11.1 as affected and identifies update guidance to version 2.12. The advisory revision history shows the initial publication date as 2025-05-01 and Update A on 2025-07-10, which added a new image release to the mitigations.

Official resources

Public advisory published by CISA on 2025-05-01 and updated on 2025-07-10. This debrief uses the CVE and advisory publication dates provided in the source data and does not infer any exploit activity beyond the supplied materials.