Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25657: n/a

0
Medium
VulnerabilityCVE-2024-25657cvecve-2024-25657
Published: Mon Mar 18 2024 (03/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An open redirect in the Login/Logout functionality of web management in AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS could allow attackers to redirect authenticated users to malicious websites.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:42:37 UTC

Technical Analysis

CVE-2024-25657 is classified as an open redirect vulnerability (CWE-601) affecting the web management interface of AVSystem Unified Management Platform (UMP) version 23.07.0.16567~LTS. The vulnerability resides in the Login and Logout functionality, where the application improperly validates or sanitizes URL parameters used for redirection after authentication events. An attacker can craft a URL that appears legitimate but redirects an authenticated user to a malicious external site when clicked. This can facilitate phishing attacks, credential theft, or malware distribution by exploiting user trust in the legitimate platform. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting medium severity, with attack vector being network-based, no privileges required, but user interaction necessary. The impact primarily affects confidentiality and integrity by potentially exposing users to malicious content or credential harvesting, but it does not affect system availability. No patches or known exploits have been reported at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of version details beyond the specified build suggests the issue may affect all instances of that release or similar versions. Organizations relying on AVSystem UMP for device or network management should assess exposure and prepare for mitigation.

Potential Impact

The primary impact of CVE-2024-25657 is the facilitation of social engineering attacks such as phishing by redirecting authenticated users to malicious websites. This can lead to credential compromise, session hijacking, or malware infection if users are tricked into entering sensitive information or downloading malicious payloads. Although the vulnerability does not directly compromise the AVSystem UMP platform's confidentiality, integrity, or availability, the indirect consequences can be severe, especially in environments where UMP is used to manage critical infrastructure or IoT devices. Organizations with large user bases or those operating in sectors with high security requirements (e.g., telecommunications, energy, manufacturing) are at greater risk. The medium CVSS score reflects the need for caution but indicates that exploitation requires user interaction and does not allow direct system compromise. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

1. Monitor and restrict URL parameters used in login/logout redirection to ensure only trusted domains are allowed. 2. Implement strict input validation and output encoding on redirect URLs to prevent open redirect conditions. 3. Educate users about the risks of clicking on unexpected or suspicious links, especially those purporting to come from the AVSystem UMP platform. 4. Employ web application firewalls (WAFs) to detect and block malicious redirect attempts targeting the platform. 5. Regularly review and update security policies concerning user authentication flows and session management. 6. Coordinate with AVSystem for timely patch releases and apply updates as soon as they become available. 7. Consider implementing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 8. Conduct phishing simulation exercises to raise awareness among users who access the UMP interface. 9. Audit logs for unusual redirect patterns or login/logout activities that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6db7ef31ef0b5720f3

Added to database: 2/25/2026, 9:45:17 PM

Last enriched: 2/26/2026, 10:42:37 AM

Last updated: 4/12/2026, 1:36:09 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses