Researchers from Claroty's Team82 have disclosed a critical remote code execution (RCE) vulnerability, CVE-2025-12556, in the IDIS Cloud Manager (ICM) viewer. The vulnerability, which CISA has rated with a CVSS v4 score of 8.7, enables an attacker to achieve code execution on a host machine simply by tricking a user into clicking a malicious link. This type of '1-click RCE' is particularly dangerous as it can bypass the browser sandbox and provides a direct path to system compromise, making it highly attractive for use in targeted spear-phishing campaigns. IDIS has released an update, and users are strongly advised to upgrade to ICM viewer version 1.7.1 or uninstall the application.
CVE-2025-12556 is an argument injection vulnerability within the custom URL handler used by the IDIS Cloud Manager viewer. When a user clicks a specially crafted link beginning with the idis-icm-viewer:// protocol, the browser passes the URL to the ICM viewer application. The application fails to properly sanitize the arguments passed in this URL.
An attacker can craft a URL that injects malicious commands or arguments. When the ICM viewer application processes this URL, it executes the injected code with the permissions of the host user. This allows the attacker to break out of the browser's security sandbox and execute arbitrary code on the underlying operating system.
Attack Vector: The user must be convinced to click a malicious link. This can be delivered via a phishing email, a deceptive website, or a chat message.
The vulnerability stems from a common flaw in applications that implement custom URL protocol handlers. These handlers are a convenient way to launch a local application from a web browser, but they become a security risk if they trust and execute input from the URL without rigorous validation.
In this case, an attacker could craft a link like: idis-icm-viewer://?argument=[malicious_command]
The ICM viewer application would parse this and execute [malicious_command] on the user's system. This could be used to launch PowerShell to download and run malware, for example.
T1566.002 - Phishing: Spearphishing LinkT1204.002 - User Execution: Malicious File (While a link, the user's click causes execution on the host), T1203 - Exploitation for Client ExecutionT1218 - System Binary Proxy Execution (The injected command could use a legitimate system binary like mshta.exe or rundll32.exe to execute malware).A successful exploit gives an attacker the ability to execute code with the same privileges as the user who clicked the link. The business impact is severe:
This '1-click' nature of the RCE makes it a low-effort, high-impact vulnerability for attackers.
ICM Viewer process spawning suspicious child processes like cmd.exe, powershell.exe, or other scripting engines. This is a primary indicator of exploitation.ICM Viewer process with unusual command-line arguments. Enable process command-line logging (e.g., via Sysmon Event ID 1) to facilitate this.M1017 - User Training.idis-icm-viewer:// protocol handler in the Windows Registry. This would prevent the vulnerability from being triggered from a browser but may break legitimate functionality. This should only be done by experienced administrators.Immediately update the IDIS Cloud Manager viewer to the patched version 1.7.1 to remediate the vulnerability.
Mapped D3FEND Techniques:
If the software is not business-critical, uninstall it to completely remove the attack surface.
Mapped D3FEND Techniques:
Train users to be skeptical of unsolicited links, even those that seem to launch legitimate applications.
The primary and most effective countermeasure against CVE-2025-12556 is to immediately deploy the patched version 1.7.1 of the IDIS Cloud Manager viewer. Organizations should use their software deployment and patch management systems to push this update to all workstations where the viewer is installed. It is crucial to not only deploy the patch but also to verify its installation across the entire fleet of endpoints. Given the '1-click' nature of this RCE, any unpatched system represents a significant and easily exploitable risk. If the software is not actively used or required, the best course of action is complete uninstallation to eliminate the attack surface entirely.
To detect exploitation of CVE-2025-12556, security teams must monitor the behavior of the ICM viewer process (ICMViewer.exe). An EDR solution should be configured with a rule to generate a high-priority alert whenever ICMViewer.exe spawns a child process, especially command-line interpreters like cmd.exe or powershell.exe. This is highly anomalous behavior for a video viewer application. Capturing the command-line arguments of both the parent and child processes is essential for investigation. This detection logic will catch the attacker's attempt to execute code on the host system immediately after the user clicks the malicious link, enabling a rapid incident response.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats