Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 3, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 3, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 3, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 3, 2025

      All the WWE 2K25 locker codes that are currently active

      June 3, 2025

      PSA: You don’t need to spend $400+ to upgrade your Xbox Series X|S storage

      June 3, 2025

      UK civil servants saved 24 minutes per day using Microsoft Copilot, saving two weeks each per year according to a new report

      June 3, 2025

      These solid-state fans will revolutionize cooling in our PCs and laptops

      June 3, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Community News: Latest PECL Releases (06.03.2025)

      June 3, 2025
      Recent

      Community News: Latest PECL Releases (06.03.2025)

      June 3, 2025

      A Comprehensive Guide to Azure Firewall

      June 3, 2025

      Test Job Failures Precisely with Laravel’s assertFailedWith Method

      June 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      All the WWE 2K25 locker codes that are currently active

      June 3, 2025
      Recent

      All the WWE 2K25 locker codes that are currently active

      June 3, 2025

      PSA: You don’t need to spend $400+ to upgrade your Xbox Series X|S storage

      June 3, 2025

      UK civil servants saved 24 minutes per day using Microsoft Copilot, saving two weeks each per year according to a new report

      June 3, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA Flags Critical Trimble Cityworks Vulnerability (CVE-2025-0994) in KEV Catalog

    CISA Flags Critical Trimble Cityworks Vulnerability (CVE-2025-0994) in KEV Catalog

    February 10, 2025

    CVE-2025-0994

    The Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog. The vulnerability, identified as CVE-2025-0994, affects Trimble Cityworks, a widely used software for asset management and geographic information system (GIS) applications. This issue, known as the Trimble Cityworks Deserialization vulnerability, poses cybersecurity risks, especially to federal enterprises, by allowing attackers to execute remote code on affected systems. 

    An Overview of CVE-2025-0994 

    The CVE-2025-0994 vulnerability exists in Trimble Cityworks versions prior to 15.8.9 and Cityworks with Office Companion versions earlier than 23.10. This deserialization vulnerability enables authenticated users to exploit the software and potentially execute remote code on a vulnerable system. Specifically, the flaw could allow attackers to compromise a customer’s Microsoft Internet Information Services (IIS) web server, leading to remote code execution (RCE) and potentially giving malicious actors full control over the server.

    CISA has classified the severity of this vulnerability as High based on its CVSS score of 8.6. The flaw primarily affects the underlying deserialization of untrusted data, a common vector for many cyberattacks. As a result, CVE-2025-0994 has become a matter of concern for organizations relying on vulnerable versions of the software.

    A Deserialization Attack: What Is at Stake? 

    Deserialization vulnerabilities, like CVE-2025-0994, occur when untrusted data is deserialized into an object that could allow attackers to inject malicious payloads into the application. If exploited, these vulnerabilities enable remote code execution, meaning that an attacker could run arbitrary commands on the affected system, potentially leading to severe security breaches.

    In this case, Trimble Cityworks’ IIS web server may become a target. As IIS is a core component for hosting Cityworks deployments, any vulnerability in this service could jeopardize the confidentiality, integrity, and availability of critical data and services. This puts organizations at considerable risk, especially those in sectors where infrastructure management and GIS data are vital.

    Trimble’s Response: Timely Patches 

    Following the discovery of the vulnerability, Trimble quickly addressed the issue. They released security updates for both Cityworks 15.x and Cityworks 23.x software versions. The updates, which were made available to users on January 28 and 29, 2025, respectively, provide fixes that mitigate the deserialization flaw and prevent remote code execution attacks.

    Trimble also issued a communication urging on-premise customers to update to the new versions immediately. The company reassured customers that the updates would be applied automatically to Cityworks Online (CWOL) deployments, reducing the need for additional action by users.

    Additionally, Trimble identified two other potential security concerns in their communication: overprivileged IIS identity permissions and improperly configured attachment directories. These issues were highlighted as further areas for improvement, with specific guidance provided for users to mitigate these risks.

    The Role of CISA in Addressing Vulnerabilities 

    The inclusion of CVE-2025-0994 in the CISA Known Exploited Vulnerabilities Catalog emphasizes the increasing significance of cybersecurity in both the public and private sectors. By adding this vulnerability to the catalog, CISA aims to raise awareness and help organizations prioritize the patching of critical vulnerabilities that are actively being exploited by cybercriminals.

    CISA’s catalog serves as an essential resource for federal agencies and other organizations looking to bolster their cybersecurity posture. The catalog is regularly updated with newly discovered vulnerabilities that pose significant threats to critical infrastructure, and CVE-2025-0994 is just one of the latest examples.

    In this instance, CISA has made it clear that this vulnerability is of particular concern due to its active exploitation in the wild. Organizations are strongly advised to implement the available patches and take other necessary security precautions to protect their systems.

    Conclusion

    To mitigate the risks posed by CVE-2025-0994, Trimble Cityworks users must promptly apply the latest patches, ensuring they update to versions 15.8.9 and above for Cityworks 15.x and 23.10 and above for Cityworks with Office Companion. Additionally, it’s crucial to configure IIS identity permissions properly and address attachment directory settings to further enhance security. As these threats continues to target new victims, staying vigilant and addressing vulnerabilities like CVE-2025-0994 is important for protecting sensitive systems. Organizations must prioritize patching and security measures to protect their infrastructure from malicious exploitation.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMobile Car Paint & Body Repair Chelmsford, Brentwood, Essex | Essex Smart Repairs
    Next Article ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

    Related Posts

    Security

    BitoPro Silent on $11.5M Hack: Investigator Uncovers Massive Crypto Theft

    June 3, 2025
    Security

    New Linux Vulnerabilities

    June 3, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Google Spoofed in Sophisticated DKIM Replay Attack Exploiting Email Trust Mechanisms

    Security

    Apache Cordova App Harness Targeted in Dependency Confusion Attack

    Development

    Scriptorium – write short stories and novels

    Linux

    Enhancing Anomaly Detection with Adaptive Noise: A Pseudo Anomaly Approach

    Development

    Highlights

    CVE-2025-45388 – Wagtail CMS Stored XSS

    May 7, 2025

    CVE ID : CVE-2025-45388

    Published : May 7, 2025, 7:16 p.m. | 20 minutes ago

    Description : Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Chrome 136 Released with bug fixes

    May 1, 2025

    See-Through Parallel Universes with Your Mind’s Eye – The Course Guidebook: Chapter 10

    April 23, 2025

    CVE-2025-0358 – Axis VAPIX Device Configuration Privilege Escalation Vulnerability

    June 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.