Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-0364 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: BigAntSoft BigAnt Server has a critical flaw allowing **unauthenticated Remote Code Execution (RCE)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-288** (Authentication Bypass). The flaw lies in the **default exposed SaaS registration mechanism**.…

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **BigAntSoft BigAnt Server**. πŸ“¦ **Version**: **5.6.06 and earlier**. This is a Windows-hosted on-premises chat solution for business use cases. If you are running this version or older, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With the created admin account, hackers can: 1. **Upload** arbitrary PHP files to the Cloud Storage Add-in. 2. **Execute** this code remotely. 3.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **Extremely Low**. 🚫 **Auth**: None required initially. 🎯 **Config**: Relies on the default exposed SaaS registration. 🧩 **Complexity**: Low (just a simple CAPTCHA).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: **YES**. A PoC is available on GitHub (vulncheck-oss/cve-2025-0364). It demonstrates the full chain: Registration Bypass β†’ Admin Account β†’ PHP Upload β†’ RCE.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Scan for **BigAntSoft BigAnt Server** services. 2. Check version number (is it ≀ 5.6.06?). 3. Test if the **SaaS registration endpoint** is publicly accessible without strict verification. 4.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The advisory was published on **2025-02-04**. You must contact **BigAntSoft** immediately for a patched version. Do not rely on third-party fixes; official vendor patches are the only secure solution.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Block Access**: Restrict the SaaS registration URL to internal IPs only via firewall. 2. **Disable Registration**: If possible, disable the public registration feature entirely. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL / IMMEDIATE ACTION**. With CVSS High severity, low exploitation complexity, and public PoC, this is an **active threat**.…