Products | Versions |
---|---|
Spotfire Analyst | 14.0.5 and earlier, 14.1.0, 14.2.0, 14.3.0, 14.4.0, 14.4.1 |
Spotfire Enterprise Runtime for R | 6.1.4 and earlier |
Spotfire Statistics Services | 14.0.6 and earlier, 14.1.0, 14.2.0, 14.3.0, 14.4.0, 14.4.1 |
Spotfire Enterprise Runtime for R - Server Edition | 1.17.6 and earlier, 1.18.0, 1.19.0, 1.20.0, 1.21.0, 1.21.1 |
Spotfire Desktop | 14.4.1 and earlier |
Original release date: April 08, 2025
Last revised: —
CVE-2025-3114
Source: Cloud Software Group Inc.
Below are the Vulnerabilities that have been identified in Spotfire, which could allow attackers to execute arbitrary code:
Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.
Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security controls, and compromise the system.
CVSS v4.0 Base Score: 9.4 (Critical)
(CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
Cloud Software Group has released updated versions of the affected systems which address this issue:
Security Advisory regarding Spotfire Code Execution Vulnerability