Description
An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4.
Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Published: 2025-02-24
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4287 An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
History

Tue, 26 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Tue, 26 Aug 2025 11:15:00 +0000

Type Values Removed Values Added
Title Improper input validation in

Tue, 26 Aug 2025 10:45:00 +0000

Type Values Removed Values Added
Title Improper input validation in Network-M2 card Improper input validation in

Tue, 26 Aug 2025 10:30:00 +0000

Type Values Removed Values Added
Title Improper input validation in Improper input validation in Network-M2 card
Weaknesses CWE-78

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Title Improper input validation in
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2025-08-26T10:31:04.935Z

Reserved: 2025-01-07T09:41:16.734Z

Link: CVE-2025-22495

cve-icon Vulnrichment

Updated: 2025-03-03T19:12:08.038Z

cve-icon NVD

Status : Deferred

Published: 2025-02-24T17:15:13.723

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-22495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses