ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog
Elog elog |
|
| Vendors & Products |
Elog
Elog elog |
Fri, 31 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration. | |
| Title | ELOG configuration file authorization bypass | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-10-31T18:31:21.412Z
Updated: 2025-11-04T15:58:49.177Z
Reserved: 2025-10-30T20:40:29.749Z
Link: CVE-2025-64348
Updated: 2025-11-04T15:58:46.041Z
Status : Awaiting Analysis
Published: 2025-10-31T19:15:51.610
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-64348
No data.