Description
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
Problem types
Product status
*
Credits
Karl Meister, CISA
References
bitbucket.org/...ts/f81e5695c40997322fe2713bfdeba459d9de09dc (url)
bitbucket.org/...ts/7092ff64f6eb9521f8cc8c52272a020bf3730946 (url)
www.cve.org/CVERecord?id=CVE-2025-64348 (url)
raw.githubusercontent.com/...IT/white/2025/va-25-304-01.json (url)