Advisory

Elseta reports critical vulnerability in Vinci Protocol Analyzer

Take action: If you are using Elseta Vinci Protocol Analyzer, make sure it's isolated from the internet and accessible only from trusted networks. Then plan a regular patch process.


Learn More

Elseta is reporting a critical security vulnerability in their Vinci Protocol Analyzer system that could allow attackers to perform privilege escalation and execute arbitrary code on affected systems.

The vulnerability is tracked as CVE-2025-1265 (CVSS score 9.9) and allows remote exploitation, OS command injection leading to privilege escalation that could potentially lead to complete system compromise through code execution

The following Elseta product and versions are affected:

  • Vinci Protocol Analyzer: Versions prior to 3.2.3.19

Elseta has released a patch and recommends users update to version 3.2.3.19 or later to address this vulnerability.

As of February 20, 2025, CISA reports no known public exploitation targeting this vulnerability.

Elseta reports critical vulnerability in Vinci Protocol Analyzer