Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.
History

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Thu, 25 Sep 2025 04:30:00 +0000

Type Values Removed Values Added
References

Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Partner Software
Partner Software partner Software
Partner Software partner Web
Vendors & Products Partner Software
Partner Software partner Software
Partner Software partner Web

Mon, 04 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 02 Aug 2025 02:45:00 +0000

Type Values Removed Values Added
Description Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.
Title CVE-2025-6076
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-11-03T20:06:46.248Z

Reserved: 2025-06-13T15:17:17.314Z

Link: CVE-2025-6076

cve-icon Vulnrichment

Updated: 2025-11-03T20:06:46.248Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-02T03:15:23.140

Modified: 2025-11-03T20:19:17.897

Link: CVE-2025-6076

cve-icon Redhat

No data.