CVE-2025-41379

Injection vulnerability in Iridium Certus 700

Description

The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule, the ID used to create the database entry may be different from the JSON ID. If the rule needs to be deleted later, the system will use the JSON ID and therefore fail. This can be exploited by an attacker to create rules that cannot be deleted unless the device is reset to factory defaults.

Remediation

Solution:

  • The vulnerability has been resolved by the Intellian Technologies team in the Q2 2025 release.

Category

6.3
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.08%
Affected: Intellian Technologies Iridium Certus 700
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-41379?
CVE-2025-41379 has been scored as a medium severity vulnerability.
How to fix CVE-2025-41379?
To fix CVE-2025-41379: The vulnerability has been resolved by the Intellian Technologies team in the Q2 2025 release.
Is CVE-2025-41379 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-41379 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-41379?
CVE-2025-41379 affects Intellian Technologies Iridium Certus 700.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.