CVE-2025-10761: Improper Restriction of Excessive Authentication Attempts in Harness
A vulnerability has been found in Harness 3.3.0. Affected is an unknown function of the file /api/v1/login of the component Login Endpoint. The manipulation leads to improper restriction of excessive authentication attempts. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10761 is a vulnerability identified in Harness version 3.3.0, specifically affecting the login endpoint at /api/v1/login. The core issue is an improper restriction on excessive authentication attempts, meaning the system does not adequately limit the number of login attempts an attacker can make. This flaw allows an attacker to perform brute-force or credential-stuffing attacks remotely without triggering effective lockout mechanisms. The vulnerability is remotely exploitable without requiring any authentication or user interaction, but it has a high attack complexity, indicating that exploitation requires significant effort or specific conditions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting that while the vulnerability can be exploited remotely, the impact on confidentiality, integrity, and availability is limited (only a low impact on confidentiality is noted). The vendor has been contacted but has not responded, and no patches or mitigations have been publicly released yet. The vulnerability disclosure is public, but no known exploits are currently observed in the wild. This vulnerability could allow attackers to gain unauthorized access to user accounts by repeatedly attempting passwords without effective rate limiting or lockout, potentially leading to account compromise if weak or reused credentials are present.
Potential Impact
For European organizations using Harness 3.3.0, this vulnerability poses a risk of unauthorized access through brute-force attacks on user accounts. Although the impact on confidentiality is considered low, successful exploitation could lead to account takeover, exposing sensitive project deployment pipelines, configuration data, or other critical operational information managed through Harness. This could disrupt DevOps workflows, cause data leakage, or enable further lateral movement within the organization’s infrastructure. Given the medium severity and high attack complexity, the threat is moderate but should not be underestimated, especially in environments where multi-factor authentication is not enforced or where weak passwords are common. The lack of vendor response and absence of patches increases the risk window for European entities relying on this software. Additionally, organizations in regulated sectors (finance, healthcare, critical infrastructure) may face compliance and reputational risks if such an account compromise occurs.
Mitigation Recommendations
European organizations should immediately audit their use of Harness 3.3.0 and consider the following mitigations: 1) Implement external rate limiting and account lockout policies at the network or application gateway level to prevent brute-force attempts against the login endpoint. 2) Enforce strong password policies and mandatory multi-factor authentication (MFA) for all users accessing Harness to reduce the risk of credential compromise. 3) Monitor authentication logs for unusual patterns indicative of brute-force or credential stuffing attacks and trigger alerts for investigation. 4) If feasible, isolate the Harness login endpoint behind VPNs or IP allowlists to restrict access to trusted networks. 5) Engage with the vendor or community to track any forthcoming patches or updates and plan for immediate deployment once available. 6) Consider upgrading to a later, unaffected version of Harness if available. 7) Conduct user awareness training on credential hygiene and phishing risks to reduce the likelihood of compromised credentials being used.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-10761: Improper Restriction of Excessive Authentication Attempts in Harness
Description
A vulnerability has been found in Harness 3.3.0. Affected is an unknown function of the file /api/v1/login of the component Login Endpoint. The manipulation leads to improper restriction of excessive authentication attempts. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10761 is a vulnerability identified in Harness version 3.3.0, specifically affecting the login endpoint at /api/v1/login. The core issue is an improper restriction on excessive authentication attempts, meaning the system does not adequately limit the number of login attempts an attacker can make. This flaw allows an attacker to perform brute-force or credential-stuffing attacks remotely without triggering effective lockout mechanisms. The vulnerability is remotely exploitable without requiring any authentication or user interaction, but it has a high attack complexity, indicating that exploitation requires significant effort or specific conditions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting that while the vulnerability can be exploited remotely, the impact on confidentiality, integrity, and availability is limited (only a low impact on confidentiality is noted). The vendor has been contacted but has not responded, and no patches or mitigations have been publicly released yet. The vulnerability disclosure is public, but no known exploits are currently observed in the wild. This vulnerability could allow attackers to gain unauthorized access to user accounts by repeatedly attempting passwords without effective rate limiting or lockout, potentially leading to account compromise if weak or reused credentials are present.
Potential Impact
For European organizations using Harness 3.3.0, this vulnerability poses a risk of unauthorized access through brute-force attacks on user accounts. Although the impact on confidentiality is considered low, successful exploitation could lead to account takeover, exposing sensitive project deployment pipelines, configuration data, or other critical operational information managed through Harness. This could disrupt DevOps workflows, cause data leakage, or enable further lateral movement within the organization’s infrastructure. Given the medium severity and high attack complexity, the threat is moderate but should not be underestimated, especially in environments where multi-factor authentication is not enforced or where weak passwords are common. The lack of vendor response and absence of patches increases the risk window for European entities relying on this software. Additionally, organizations in regulated sectors (finance, healthcare, critical infrastructure) may face compliance and reputational risks if such an account compromise occurs.
Mitigation Recommendations
European organizations should immediately audit their use of Harness 3.3.0 and consider the following mitigations: 1) Implement external rate limiting and account lockout policies at the network or application gateway level to prevent brute-force attempts against the login endpoint. 2) Enforce strong password policies and mandatory multi-factor authentication (MFA) for all users accessing Harness to reduce the risk of credential compromise. 3) Monitor authentication logs for unusual patterns indicative of brute-force or credential stuffing attacks and trigger alerts for investigation. 4) If feasible, isolate the Harness login endpoint behind VPNs or IP allowlists to restrict access to trusted networks. 5) Engage with the vendor or community to track any forthcoming patches or updates and plan for immediate deployment once available. 6) Consider upgrading to a later, unaffected version of Harness if available. 7) Conduct user awareness training on credential hygiene and phishing risks to reduce the likelihood of compromised credentials being used.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-20T07:05:11.193Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cf6e624a0b186b932318d7
Added to database: 9/21/2025, 3:17:54 AM
Last enriched: 9/29/2025, 12:45:16 AM
Last updated: 11/4/2025, 11:06:49 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20749: CWE-121 Stack Overflow in MediaTek, Inc. MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8169, MT8188, MT8195, MT8196, MT8781, MT8796
UnknownCVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
UnknownCVE-2025-20747: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20746: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20745: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.