Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10228: CWE-384 Session Fixation in Rolantis Information Technologies Agentis

0
High
VulnerabilityCVE-2025-10228cvecve-2025-10228cwe-384
Published: Tue Oct 14 2025 (10/14/2025, 09:20:38 UTC)
Source: CVE Database V5
Vendor/Project: Rolantis Information Technologies
Product: Agentis

Description

Session Fixation vulnerability in Rolantis Information Technologies Agentis allows Session Hijacking.This issue affects Agentis: before 4.44.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:41:03 UTC

Technical Analysis

CVE-2025-10228 is a session fixation vulnerability classified under CWE-384, affecting the Agentis product by Rolantis Information Technologies in versions prior to 4.44. Session fixation occurs when an attacker can set or fix a user's session identifier before authentication, allowing the attacker to hijack the session once the user logs in. In this case, the vulnerability allows remote attackers to supply a session ID to a victim, who then authenticates with that session ID, enabling the attacker to gain unauthorized access to the victim's session. The CVSS 3.1 base score of 8.8 indicates a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can fully compromise the affected system's user session, potentially accessing sensitive data, performing unauthorized actions, or disrupting services. Although no public exploits are currently known, the vulnerability's nature and severity make it a critical risk once weaponized. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability's presence in Agentis, a product used in enterprise environments, increases the risk of targeted attacks, especially where session management controls are weak or user awareness is low.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of systems using Agentis. Successful exploitation could lead to unauthorized access to sensitive corporate data, manipulation of business processes, and potential disruption of services. Industries such as finance, healthcare, and critical infrastructure that rely on Agentis for operational management or communication could face severe operational and reputational damage. The attack requires user interaction, which could be facilitated through phishing or social engineering campaigns, increasing the likelihood of successful exploitation. The high CVSS score reflects the potential for widespread impact if exploited at scale. Additionally, regulatory compliance risks arise under GDPR and other data protection laws if personal or sensitive data is compromised. The absence of known exploits currently provides a window for proactive defense, but organizations must act swiftly to prevent future attacks.

Mitigation Recommendations

1. Immediately monitor for any unusual session activity or multiple logins from the same session ID to detect potential exploitation attempts. 2. Implement strict session management controls, including regenerating session IDs upon authentication and invalidating old session tokens. 3. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction with malicious links. 4. Apply network-level protections such as web application firewalls (WAFs) to detect and block suspicious session fixation attempts. 5. Once available, promptly apply official patches or updates from Rolantis Information Technologies to remediate the vulnerability. 6. Consider implementing multi-factor authentication (MFA) to reduce the impact of session hijacking. 7. Conduct regular security assessments and penetration testing focused on session management weaknesses. 8. Review and tighten access controls and session timeout policies to minimize session exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2025-09-10T12:39:19.402Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee16307eab8b438c025d19

Added to database: 10/14/2025, 9:21:52 AM

Last enriched: 10/14/2025, 9:41:03 AM

Last updated: 10/16/2025, 12:18:12 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats