PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-67034 Unknown Vendor CVE debrief

CVE-2025-67034 affects Lantronix EDS5000 2.1.0.0R3 and is described by CISA as an authenticated OS command injection in the management interface. The issue is triggered when deleting SSL credentials via the "name" parameter, and injected commands execute with root privileges. Lantronix recommends upgrading to EDS5000 2.2.0.0R1.

Vendor
Unknown Vendor
Product
Lantronix EDS3000PS 3.1.0.0R2 EDS5000 2.1.0.0R3
CVSS
HIGH 7.2
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-10
Original CVE updated
2026-03-10
Advisory published
2026-03-10
Advisory updated
2026-03-10

Who should care

Organizations operating Lantronix EDS5000 devices, especially OT/ICS teams, network administrators, and security teams responsible for privileged management access and firmware maintenance.

Technical summary

The CISA advisory states that an authenticated attacker can inject OS commands into the "name" parameter during SSL credential deletion through the management interface. The supplied advisory notes that the resulting commands run with root privileges. The provided CVSS v3.1 vector is AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (7.2 High), indicating network-reachable impact but requiring high privileges.

Defensive priority

High. Prioritize affected EDS5000 deployments that are reachable by management users and rely on privileged administrator accounts, because successful abuse can lead to root-level command execution.

Recommended defensive actions

  • Upgrade affected Lantronix EDS5000 systems to version 2.2.0.0R1 as recommended in the advisory.
  • Restrict management-interface access to trusted administrative networks and accounts only.
  • Review privileged account usage and remove unnecessary administrative access.
  • Monitor for unexpected command execution or configuration changes on affected devices.
  • Apply general ICS hardening and access-control guidance from CISA for industrial control environments.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory for ICSA-26-069-02 and its remediation guidance. The advisory explicitly describes authenticated OS command injection in the "name" parameter when deleting SSL credentials and states that injected commands execute with root privileges. The source also recommends upgrading EDS5000 firmware to 2.2.0.0R1. No additional exploitation details are included here.

Official resources

Publicly disclosed by CISA on 2026-03-10 as ICSA-26-069-02 / CVE-2025-67034.