Critical severity9.8NVD Advisory· Published Sep 30, 2025· Updated May 11, 2026
CVE-2025-56513
CVE-2025-56513
Description
NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector. NOTE: the Supplier reports that the existence of an http://update.nicehash.com URL is a fabrication, and that there is no other use of HTTP (rather than HTTPS).
Affected products
3cpe:2.3:a:nicehash:quickminer:6.12.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:nicehash:quickminer:6.12.0:*:*:*:*:*:*:*
- (no CPE)range: = 6.12.0
- NiceHash/QuickMinerdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.