Latest BigAntSoft vulnerabilities #

VulnCheck has reported a vulnerability in BigAntSoft BigAnt Office Messenger. This software is used as an on-premises enterprise chat solution.

This vulnerability, assigned CVE-2025-0364, is rated highly critical, with a CVSS score of 9.8.

Versions of BigAntSoft BigAnt Office Messenger versions up to and including 5.6.06 are vulnerable.

    What is the impact? #

    Successfully exploiting this vulnerability would allow an attacker to take complete control of the vulnerable system. This vulnerability can be exploited remotely and without authentication.

    Are updates or workarounds available? #

    There is currently no patch for the vulnerable software. Users are recommended to discontinue use of the software until a patch is available, or limit network access to the service to trusted devices only.

    How to find potentially vulnerable BigAnt Office Messenger services with runZero #

    From the Services Inventory, use the following query to locate systems running potentially vulnerable software:

    _asset.protocol:http AND protocol:http AND _service.last.html.title:="BigAnt Admin"

    Written by Rob King

    Rob King is the Director of Security Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped design SC Magazine's Data Leakage Prevention Product of the Year for 2010, and was awarded the 3Com Innovator of the Year Award in 2009. He has been invited to speak at BlackHat, Shmoocon, SANS Network Security, and USENIX.

    More about Rob King
    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.


    Explore more

    Webcasts
    The Unreasonable Effectiveness of Inside Out Attack Surface Management
    HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
    Webcasts
    Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
    Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
    runZero Insights
    Ensure compliance with DORA’s ICT risk framework using runZero
    Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
    Talks
    DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
    This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

    See Results in Minutes

    Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

    © Copyright 2025 runZero, Inc. All Rights Reserved