We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3424

3.2.1 Arbitrary File Read in insecure .NET Remoting TCP Channel



Description

The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the "Object Marshalling" technique, which allows an attacker to read internal files without any authentication. This is possible by crafting specific .NET Remoting URLs derived from information enumerated in the client-side configuration files. This issue affects IntelliSpace Portal: 12 and prior.

Reserved 2025-04-07 | Published 2025-04-07 | Updated 2025-04-10 | Assigner Philips


HIGH: 7.7CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:M/U:Green

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

12 and prior
affected

Credits

Victor A Morales finder

Omar A Crespo finder

References

www.cve.org/CVERecord?id=CVE-2025-3424

www.philips.com/a-w/security/security-advisories.html

cve.org (CVE-2025-3424)

nvd.nist.gov (CVE-2025-3424)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3424

Support options

Helpdesk Chat, Email, Knowledgebase