CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
6DescriptionNVD
CyberData 011209 Intercom
could allow an authenticated attacker to upload arbitrary files to multiple locations within the system.
AnalysisAI
Critical arbitrary file upload vulnerability in CyberData 011209 Intercom systems that allows authenticated attackers to upload malicious files to multiple locations within the system without user interaction. With a CVSS 9.8 score and network-accessible attack surface requiring only valid authentication credentials, this vulnerability poses severe risk to organizations deploying these intercom systems. The vulnerability enables complete system compromise through arbitrary file placement, potentially allowing remote code execution, system manipulation, and data theft.
Technical ContextAI
CyberData 011209 Intercom systems are network-based communication devices commonly deployed in enterprise and commercial environments. The vulnerability exists in the file upload functionality (CWE-35: Path Traversal) which fails to properly validate or restrict the locations where authenticated users can upload files. CWE-35 represents improper resource validation where user-controlled input determining file destination paths is not sanitized, allowing attackers to traverse directory structures and write files to sensitive system locations outside intended upload directories. The authentication requirement (PR:N in CVSS vector indicates no privileges required for exploitation once authenticated) suggests the vulnerability exists in a post-authentication code path, likely in web-based management interfaces or file management APIs commonly found in IP-based intercom systems.
RemediationAI
Immediate actions: (1) Contact CyberData Corporation directly for patched firmware versions and security advisories for the 011209 Intercom system; (2) Apply firmware updates as soon as available from CyberData support channels; (3) Interim mitigations pending patches: restrict network access to intercom management interfaces using firewall rules, limit administrative account access using principle of least privilege, disable remote file upload functionality if available through management interface settings, implement strong authentication (MFA if supported) for all administrative accounts; (4) Monitor CyberData security advisories at [vendor advisory portal] for patch release notifications; (5) Implement network segmentation to isolate intercom systems on dedicated VLAN with restricted access. Monitor access logs for suspicious file upload activities to multiple system directories. Vendor patch information should be obtained directly from CyberData Corporation as specific patch version numbers are not provided in available CVE data.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17590