SB2025120228 - Meinberg LANTIME firmware update for third-party components



SB2025120228 - Meinberg LANTIME firmware update for third-party components

Published: December 2, 2025

Security Bulletin ID SB2025120228
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: CVE-2025-61984)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper validation of control characters in usernames obtained from an untrusted source (such as command line and %-sequence expansion of a configuration file). A remote attacker can trick the victim into initiating an ssh connection using a specially crafted configuration file and execute arbitrary shell commands on the system. 

This vulnerability affects ssh client command and does not affect the sshd daemon. 


2) Improper Neutralization of Null Byte or NUL Character (CVE-ID: CVE-2025-61985)

The vulnerability allows a remote attacker to execute arbitrary OS commands on the system.

The vulnerability exists due to incorrect handling of the nullbyte character in an ssh:// URI if a ProxyCommand that uses the %r expansion was configured. A remote attacker can trick the victim into using a specially crafted ssh command to connect to a remote server and execute arbitrary OS commands on the system.

This vulnerability affects ssh client command and does not affect the sshd daemon. 


3) Insufficient verification of data authenticity (CVE-ID: CVE-2025-11411)

The vulnerability allows a remote attacker to poison DNS cache. 

The vulnerability exists due to incorrect processing of DNS responses contain NS RRSets records. A remote attacker can poison DNS cache of the affected server.

Remediation

Install update from vendor's website.