Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-64123

Summary
Assigner-Dragos
Assigner Org ID-12bdf821-1545-4a87-aac5-61670cc6fcef
Published At-02 Jan, 2026 | 21:41
Updated At-05 Jan, 2026 | 20:37
Rejected At-
Credits

Nuvation Energy Multi-Stack Controller Proxy service allows arbitrary BMS access

Unintended Proxy or Intermediary vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows Network Boundary Bridging.This issue affects Multi-Stack Controller (MSC): through and including release 2.5.1.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Dragos
Assigner Org ID:12bdf821-1545-4a87-aac5-61670cc6fcef
Published At:02 Jan, 2026 | 21:41
Updated At:05 Jan, 2026 | 20:37
Rejected At:
â–¼CVE Numbering Authority (CNA)
Nuvation Energy Multi-Stack Controller Proxy service allows arbitrary BMS access

Unintended Proxy or Intermediary vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows Network Boundary Bridging.This issue affects Multi-Stack Controller (MSC): through and including release 2.5.1.

Affected Products
Vendor
Nuvation Energy
Product
Multi-Stack Controller (MSC)
Default Status
unaffected
Versions
Affected
  • From 0 through 2.5.1 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-441CWE-441: Unintended Proxy or Intermediary
Type: CWE
CWE ID: CWE-441
Description: CWE-441: Unintended Proxy or Intermediary
Metrics
VersionBase scoreBase severityVector
4.07.9HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/S:P
Version: 4.0
Base score: 7.9
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/S:P
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-700CAPEC-700 Network Boundary Bridging
CAPEC ID: CAPEC-700
Description: CAPEC-700 Network Boundary Bridging
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dragos.com/community/advisories/CVE-2025-64119
N/A
Hyperlink: https://www.dragos.com/community/advisories/CVE-2025-64119
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ot-cert@dragos.com
Published At:02 Jan, 2026 | 22:15
Updated At:26 Feb, 2026 | 19:59

Unintended Proxy or Intermediary vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows Network Boundary Bridging.This issue affects Multi-Stack Controller (MSC): through and including release 2.5.1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.9HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:X/R:X/V:X/RE:X/U:X
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.9
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

nuvationenergy
nuvationenergy
>>nplatform>>Versions up to 2.5.1(inclusive)
cpe:2.3:a:nuvationenergy:nplatform:*:*:*:*:*:*:*:*
nuvationenergy
nuvationenergy
>>nuvmsc3-04s-c>>-
cpe:2.3:h:nuvationenergy:nuvmsc3-04s-c:-:*:*:*:*:*:*:*
nuvationenergy
nuvationenergy
>>nuvmsc3-08s-c>>-
cpe:2.3:h:nuvationenergy:nuvmsc3-08s-c:-:*:*:*:*:*:*:*
nuvationenergy
nuvationenergy
>>nuvmsc3-12s-c>>-
cpe:2.3:h:nuvationenergy:nuvmsc3-12s-c:-:*:*:*:*:*:*:*
nuvationenergy
nuvationenergy
>>nuvmsc3-16s-c>>-
cpe:2.3:h:nuvationenergy:nuvmsc3-16s-c:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-441Secondaryot-cert@dragos.com
CWE ID: CWE-441
Type: Secondary
Source: ot-cert@dragos.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.dragos.com/community/advisories/CVE-2025-64119ot-cert@dragos.com
Third Party Advisory
Hyperlink: https://www.dragos.com/community/advisories/CVE-2025-64119
Source: ot-cert@dragos.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2025-64121
Matching Score-8
Assigner-Dragos, Inc.
ShareView Details
Matching Score-8
Assigner-Dragos, Inc.
CVSS Score-10||CRITICAL
EPSS-0.12% / 30.89%
||
7 Day CHG~0.00%
Published-02 Jan, 2026 | 21:35
Updated-26 Feb, 2026 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nuvation Energy Multi-Stack Controller Authentication Bypass

Authentication Bypass Using an Alternate Path or Channel vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows Authentication Bypass.This issue affects Multi-Stack Controller (MSC): from 2.3.8 before 2.5.1.

Action-Not Available
Vendor-nuvationenergyNuvation Energy
Product-nuvmsc3-16s-cnuvmsc3-12s-cnuvmsc3-08s-cnuvmsc3-04s-cnplatformMulti-Stack Controller (MSC)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-64125
Matching Score-6
Assigner-Dragos, Inc.
ShareView Details
Matching Score-6
Assigner-Dragos, Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.07% / 22.29%
||
7 Day CHG+0.02%
Published-03 Jan, 2026 | 00:21
Updated-08 Jan, 2026 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nuvation Energy nCloud Client-to-Client Communication

A vulnerability in Nuvation Energy nCloud VPN Service allowed Network Boundary Bridging.This issue affected the nCloud VPN Service and was fixed on 2025-12-1 (December, 2025). End users do not have to take any action to mitigate the issue.

Action-Not Available
Vendor-Nuvation Energy
Product-nCloud VPN Service
CWE ID-CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
CVE-2026-23751
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.19% / 40.69%
||
7 Day CHG~0.00%
Published-23 Apr, 2026 | 14:46
Updated-25 Apr, 2026 | 01:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kofax Capture 6.0.0.0 Unauthenticated File Read/Write & SMB Coercion via .NET Remoting

Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a default, publicly known endpoint identifier. An unauthenticated remote attacker can exploit .NET Remoting object unmarshalling techniques to instantiate a remote System.Net.WebClient object and read arbitrary files from the server filesystem, write attacker-controlled files to the server, or coerce NTLMv2 authentication to an attacker-controlled host, enabling sensitive credential disclosure, denial of service, remote code execution, or lateral movement depending on service account privileges and network environment.

Action-Not Available
Vendor-Tungsten Automation Corp.
Product-Kofax Capture
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
CVE-2021-20042
Matching Score-4
Assigner-SonicWall, Inc.
ShareView Details
Matching Score-4
Assigner-SonicWall, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.88% / 75.53%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 09:55
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Action-Not Available
Vendor-SonicWall Inc.
Product-sma_410_firmwaresma_210sma_410sma_400_firmwaresma_210_firmwaresma_500v_firmwaresma_500vsma_200_firmwaresma_200sma_400SonicWall SMA100
CWE ID-CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
Details not found