Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10650: CWE-269 Improper Privilege Management in SoftIron HyperCloud

0
Low
VulnerabilityCVE-2025-10650cvecve-2025-10650cwe-269
Published: Thu Sep 18 2025 (09/18/2025, 19:11:51 UTC)
Source: CVE Database V5
Vendor/Project: SoftIron
Product: HyperCloud

Description

SoftIron HyperCloud 2.5.0 through 2.6.3 may incorrectly add user SSH keys to the administrator-level authorized keys under certain conditions, allowing unauthorized privilege escalation to admin via SSH. Affects non-production debug and internal development builds created between versions 2.5.0 and 2.6.3.  No generally available (GA) or customer-released production builds were affected.  There is no evidence that this issue was exposed in customer environments or production deployments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:37:04 UTC

Technical Analysis

CVE-2025-10650 identifies a privilege escalation vulnerability categorized under CWE-269 (Improper Privilege Management) in SoftIron HyperCloud versions 2.5.0 through 2.6.3. The flaw arises from the incorrect addition of user SSH keys to the administrator-level authorized keys file under certain conditions in non-production debug and internal development builds. This misconfiguration allows an attacker with existing high privileges and local access to escalate privileges to administrator via SSH. The vulnerability does not affect generally available or customer-released production builds, limiting its exposure. The CVSS 4.0 base score is 1.8, reflecting low severity due to the requirement for local privileged access, high attack complexity, and no user interaction needed. The vulnerability's impact on confidentiality, integrity, and availability is limited, as it requires prior privileged access and does not allow remote exploitation. No public exploits or evidence of exploitation in the wild have been reported. The issue was reserved and published in September 2025, with no patches currently linked, likely due to its limited scope and non-production impact.

Potential Impact

The potential impact of CVE-2025-10650 is minimal for most organizations because it only affects non-production debug and internal development builds of SoftIron HyperCloud, which are not deployed in customer or production environments. If an organization uses these specific builds internally, an attacker with existing high privileges and local access could escalate to administrator privileges via SSH, potentially compromising system integrity and control. However, since the vulnerability requires prior privileged access and is not exploitable remotely, the risk of widespread damage or data breach is low. The impact on confidentiality and availability is also limited due to the constrained attack vector. Organizations running production versions of HyperCloud are not affected, reducing the overall threat landscape. Nonetheless, internal development environments with lax access controls could be at risk of privilege escalation, which might facilitate further attacks or unauthorized administrative actions.

Mitigation Recommendations

Organizations should ensure that only production builds of SoftIron HyperCloud are deployed in operational environments and avoid using non-production debug or internal development builds in any environment accessible to untrusted users. For environments where affected builds are in use, restrict local access strictly to trusted personnel and implement strong access controls and monitoring on SSH key management. Regularly audit authorized_keys files to detect unauthorized additions, especially those granting administrator-level access. Employ role-based access control (RBAC) to limit privilege escalation opportunities and segregate duties among administrators. Keep systems updated with the latest official releases from SoftIron, and monitor vendor advisories for any patches or updates addressing this issue. Additionally, implement multi-factor authentication for SSH access where possible to reduce the risk of unauthorized access even if keys are compromised. Finally, conduct security awareness training for developers and administrators to prevent inadvertent use of vulnerable builds in sensitive environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
SoftIron
Date Reserved
2025-09-17T18:55:07.506Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc59e1db1798280b3a58f4

Added to database: 9/18/2025, 7:13:37 PM

Last enriched: 2/28/2026, 2:37:04 PM

Last updated: 3/25/2026, 4:35:53 AM

Views: 185

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses