// For flags

CVE-2025-43713

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.

ASNA Assist y ASNA Registrar, anteriores al 31/03/2025, permiten ataques de deserialización contra la comunicación remota .NET. Estos servicios del sistema de Windows admiten la administración de claves de licencia y la autenticación de red de Windows obsoleta. Estos servicios se implementan con comunicación remota .NET y pueden explotarse mediante técnicas de deserialización conocidas inherentes a la tecnología. Dado que los servicios se ejecutan con permisos de nivel de sistema, se pueden manipular exploits para lograr la escalada de privilegios y la ejecución de código arbitrario. Esto afecta a DataGate para SQL Server 17.0.36.0 y 16.0.89.0, DataGate Component Suite 17.0.36.0 y 16.0.89.0, DataGate Monitor 17.0.26.0 y 16.0.65.0, DataGate WebPak 17.0.37.0 y 16.0.90.0, Monarch para .NET 11.4.50.0 y 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 y 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 y 16.0.89.0, WingsRPG 11.0.38.0 y 10.0.95.0, Mobile RPG 11.0.35.0 y 10.0.94.0, Monarch Framework para .NET FW 11.0.36.0 y 10.0.89.0, Browser Terminal 17.0.37.0 y 16.0.90.0, Visual RPG Classic 5.2.7.0 y 5.1.17.0, Visual RPG Deployment 5.2.7.0 y 5.1.17.0, y DataGate Studio 17.0.38.0 y 16.0.104.0.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-04-17 CVE Reserved
  • 2025-07-03 CVE Published
  • 2025-07-03 CVE Updated
  • 2025-07-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -