Skip to main content

CVE-2025-0669: CWE-352 Cross-Site Request Forgery (CSRF) in BOINC BOINC Server

High
VulnerabilityCVE-2025-0669cvecve-2025-0669cwe-352
Published: Wed May 07 2025 (05/07/2025, 07:39:59 UTC)
Source: CVE
Vendor/Project: BOINC
Product: BOINC Server

Description

Cross-Site Request Forgery (CSRF) vulnerability in BOINC Server allows Cross Site Request Forgery.This issue affects BOINC Server: before 1.4.3.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:58:52 UTC

Technical Analysis

CVE-2025-0669 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting BOINC Server versions prior to 1.4.3. BOINC (Berkeley Open Infrastructure for Network Computing) Server is a platform used to manage distributed computing projects, allowing volunteers to contribute computing resources. The vulnerability arises because the server does not adequately verify that requests originate from authenticated and intended users, enabling an attacker to trick a logged-in user into executing unwanted actions on the server via crafted web requests. The CVSS 4.0 score of 8.6 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The impact on confidentiality and integrity is high (VC:H, VI:H), while availability impact is none (VA:N). The scope is limited (SC:L), and there is no requirement for authentication (AT:N). This means an attacker can remotely induce a victim to perform unauthorized state-changing operations on the BOINC Server, potentially manipulating project data or user configurations without their consent. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where BOINC Server is used to coordinate critical distributed computing tasks. The lack of patch links indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation.

Potential Impact

For European organizations utilizing BOINC Server, this CSRF vulnerability poses a substantial risk to the integrity and confidentiality of distributed computing projects. Attackers could manipulate project parameters, alter user data, or disrupt the coordination of computational tasks, potentially skewing research results or causing resource misallocation. Given the collaborative and often scientific nature of BOINC projects, such interference could undermine trust in research outputs or delay critical computations. Additionally, unauthorized actions performed via CSRF could lead to privilege escalation if combined with other vulnerabilities or misconfigurations. The impact is particularly relevant for academic institutions, research centers, and organizations involved in large-scale distributed computing initiatives across Europe. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility mean that unpatched servers remain vulnerable to targeted or opportunistic attacks.

Mitigation Recommendations

European organizations should immediately verify their BOINC Server versions and upgrade to version 1.4.3 or later once available. Until patches are released, implement strict CSRF protections such as enforcing anti-CSRF tokens on all state-changing requests and validating the Origin and Referer headers to ensure requests originate from trusted sources. Employ web application firewalls (WAFs) configured to detect and block suspicious cross-site requests targeting BOINC Server endpoints. Restrict administrative access to the BOINC Server interface via network segmentation and VPNs to limit exposure. Educate users about the risks of clicking on untrusted links while authenticated to BOINC Server. Regularly audit server logs for unusual request patterns indicative of CSRF attempts. Finally, monitor official BOINC and NCSC.ch advisories for patch releases and promptly apply updates to remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
NCSC.ch
Date Reserved
2025-01-23T09:00:46.523Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9927

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 1:58:52 PM

Last updated: 7/28/2025, 8:12:22 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats