Home

Description

ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.

PUBLISHED Reserved 2025-10-30 | Published 2025-10-31 | Updated 2025-11-04 | Assigner cisa-cg




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/MPR:N/MSC:H/MSI:H/MSA:H
HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Problem types

CWE-862 Missing Authorization

Product status

Default status
affected

*
affected

Credits

Karl Meister, CISA

References

bitbucket.org/...ts/f81e5695c40997322fe2713bfdeba459d9de09dc (url)

bitbucket.org/...ts/7092ff64f6eb9521f8cc8c52272a020bf3730946 (url)

www.cve.org/CVERecord?id=CVE-2025-64348 (url)

raw.githubusercontent.com/...IT/white/2025/va-25-304-01.json (url)

cve.org (CVE-2025-64348)

nvd.nist.gov (CVE-2025-64348)

Download JSON