Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.
History

Tue, 24 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
Description Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.
Title Cleartext Transmission of Sensitive Information in Kaleris Navis N4
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-06-24T18:30:40.700Z

Updated: 2025-06-24T18:46:31.376Z

Reserved: 2025-05-22T15:55:28.362Z

Link: CVE-2025-5087

cve-icon Vulnrichment

Updated: 2025-06-24T18:46:26.891Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-24T19:15:23.757

Modified: 2025-06-26T18:58:14.280

Link: CVE-2025-5087

cve-icon Redhat

No data.