vulnerability, which could allow a remote attacker to execute arbitrary
JavaScript on the victim's browser.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser. | |
| Title | Zenitel TCIV-3+ Cross-site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-26T18:31:42.926Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64130
Updated: 2025-11-26T18:31:28.046Z
Status : Deferred
Published: 2025-11-26T18:15:50.243
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-64130
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:15Z