Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 10 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog Project
Elog Project elog |
|
| CPEs | cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Elog Project
Elog Project elog |
Tue, 04 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog
Elog elog |
|
| Vendors & Products |
Elog
Elog elog |
Fri, 31 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration. | |
| Title | ELOG configuration file authorization bypass | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-11-04T15:58:49.177Z
Reserved: 2025-10-30T20:40:29.749Z
Link: CVE-2025-64348
Updated: 2025-11-04T15:58:46.041Z
Status : Modified
Published: 2025-10-31T19:15:51.610
Modified: 2026-04-26T19:26:45.093
Link: CVE-2025-64348
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:43:48Z