Executive Summary
In February 2026, a critical OS command injection vulnerability (CVE-2026-25108) was identified in Soliton Systems' FileZen file transfer appliance. This flaw allows authenticated users to execute arbitrary operating system commands via specially crafted HTTP requests when the Antivirus Check Option is enabled. Affected versions include FileZen V5.0.0 to V5.0.10 and V4.2.1 to V4.2.8. Exploitation of this vulnerability could lead to full system compromise, data theft, and unauthorized access to sensitive information. (nvd.nist.gov)
The inclusion of CVE-2026-25108 in CISA's Known Exploited Vulnerabilities Catalog underscores the urgency for organizations to address this issue promptly. With active exploitation observed, entities using vulnerable versions of FileZen are at heightened risk. Immediate patching to version V5.0.11 or later is strongly recommended to mitigate potential threats. (helpnetsecurity.com)
Why This Matters Now
The active exploitation of CVE-2026-25108 poses a significant threat to organizations relying on FileZen for secure file transfers. Prompt remediation is essential to prevent potential data breaches and system compromises.
Attack Path Analysis
An attacker with valid credentials exploited an OS command injection vulnerability in FileZen to execute arbitrary commands, escalating privileges to gain full control over the system. They moved laterally within the network, established command and control channels, exfiltrated sensitive data, and potentially deployed ransomware to disrupt operations.
Kill Chain Progression
Initial Compromise
Description
An attacker with valid credentials exploited an OS command injection vulnerability in FileZen to execute arbitrary commands.
Related CVEs
CVE-2026-25108
CVSS 8.8An OS command injection vulnerability in Soliton Systems K.K. FileZen allows authenticated users to execute arbitrary OS commands via specially crafted HTTP requests when the Antivirus Check Option is enabled.
Affected Products:
Soliton Systems K.K. FileZen – 4.2.1 up to 5.0.11
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploitation for Client Execution
Exploit Public-Facing Application
Command and Scripting Interpreter: Unix Shell
Valid Accounts
System Information Discovery
Impair Defenses: Disable or Modify Tools
Exfiltration Over C2 Channel
Inhibit System Recovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Penetration Testing and Vulnerability Assessments
Control ID: 500.05
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Asset Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Federal agencies face mandatory remediation under BOD 22-01 for CVE-2026-25108 FileZen vulnerability, requiring immediate OS command injection protections and compliance.
Financial Services
Banking institutions using Soliton FileZen systems vulnerable to command injection attacks, requiring enhanced egress security and threat detection capabilities for compliance.
Health Care / Life Sciences
Healthcare organizations face HIPAA compliance risks from FileZen OS command injection vulnerability, needing encrypted traffic controls and zero trust segmentation implementation.
Information Technology/IT
IT service providers managing FileZen deployments must implement inline IPS and multicloud visibility controls to prevent lateral movement and data exfiltration.
Sources
- CISA Adds One Known Exploited Vulnerability to Cataloghttps://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalogVerified
- NVD - CVE-2026-25108https://nvd.nist.gov/vuln/detail/CVE-2026-25108Verified
- JVN#84622767: Soliton Systems K.K. FileZen OS Command Injection Vulnerabilityhttps://jvn.jp/en/jp/JVN84622767/Verified
- Soliton Systems K.K. Support Informationhttps://www.soliton.co.jp/support/2026/006657.htmlVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to escalate privileges, move laterally, establish command and control channels, and exfiltrate data, thereby reducing the overall impact.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit the OS command injection vulnerability may have been limited, reducing the likelihood of arbitrary command execution.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges and gain full control over the system could have been constrained, reducing the scope of unauthorized access.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement within the network could have been restricted, reducing the number of compromised systems.
Control: Multicloud Visibility & Control
Mitigation: The establishment of command and control channels may have been detected and constrained, reducing the attacker's ability to maintain persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: The exfiltration of sensitive data to external servers could have been restricted, reducing data loss.
The deployment of ransomware and subsequent encryption of critical files could have been constrained, reducing operational disruption.
Impact at a Glance
Affected Business Functions
- File Transfer Services
- Data Storage Management
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive files and data stored within the FileZen system.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within the network.
- • Deploy Inline IPS (Suricata) to detect and prevent exploitation of known vulnerabilities.
- • Utilize Threat Detection & Anomaly Response systems to identify and respond to suspicious activities.
- • Enforce Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration.
- • Ensure timely application of security patches and updates to mitigate known vulnerabilities.



