Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.
History

Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Partner Software
Partner Software partner Software
Partner Software partner Web
Vendors & Products Partner Software
Partner Software partner Software
Partner Software partner Web

Mon, 04 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 02 Aug 2025 02:45:00 +0000

Type Values Removed Values Added
Description Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.
Title CVE-2025-6076
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2025-08-02T02:15:31.536Z

Updated: 2025-08-04T14:02:00.889Z

Reserved: 2025-06-13T15:17:17.314Z

Link: CVE-2025-6076

cve-icon Vulnrichment

Updated: 2025-08-04T14:00:59.061Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-02T03:15:23.140

Modified: 2025-08-04T15:06:15.833

Link: CVE-2025-6076

cve-icon Redhat

No data.