CVE-2025-0994
HIGHCVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
3Description
Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server.
Analysis
Trimble Cityworks asset management platform contains a deserialization vulnerability allowing authenticated users to achieve remote code execution on the IIS web server hosting the application.
Technical Context
The CWE-502 deserialization flaw processes untrusted serialized data from authenticated users. The .NET deserialization executes in the context of the IIS application pool, allowing OS command execution on the web server.
Affected Products
['Trimble Cityworks before 15.8.9', 'Trimble Cityworks with Office Companion before 23.10']
Remediation
Update Cityworks. Implement .NET serialization filtering. Restrict application access to authorized users. Monitor IIS for suspicious process execution.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today