Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11145: CWE-203 Observable Discrepancy in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. enVision

0
High
VulnerabilityCVE-2025-11145cvecve-2025-11145cwe-203cwe-200cwe-359
Published: Fri Oct 24 2025 (10/24/2025, 14:25:37 UTC)
Source: CVE Database V5
Vendor/Project: CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc.
Product: enVision

Description

Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.

AI-Powered Analysis

AILast updated: 10/31/2025, 15:36:08 UTC

Technical Analysis

CVE-2025-11145 is a vulnerability identified in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc.'s enVision product, affecting versions prior to build 250566. The core issue is an observable discrepancy that allows unauthorized actors to perform account footprinting, effectively exposing sensitive and private personal information. This vulnerability is classified under CWE-203 (Observable Discrepancy), CWE-200 (Exposure of Sensitive Information), and CWE-359 (Exposure of Private Information), indicating that the flaw arises from the system revealing information through its responses or behavior that should remain confidential. The vulnerability can be exploited remotely over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 7.5 reflects a high severity, primarily due to the high impact on confidentiality (C:H), with no impact on integrity or availability, and no privileges required (PR:N). The vulnerability enables attackers to enumerate or confirm the existence of accounts or sensitive data, which can be leveraged for further targeted attacks such as phishing, social engineering, or brute force attempts. Although no public exploits are known at this time, the low complexity of the attack vector and the lack of required privileges make it a critical issue to address. The absence of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for defensive measures and monitoring.

Potential Impact

For European organizations, the exposure of sensitive and private personal information through this vulnerability can lead to significant confidentiality breaches, potentially violating GDPR and other data protection regulations. Account footprinting can facilitate further attacks, including credential stuffing, targeted phishing, and social engineering campaigns, increasing the risk of unauthorized access and data compromise. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on enVision for system management or monitoring are particularly at risk. The breach of personal data could result in reputational damage, regulatory fines, and operational disruptions. Since the vulnerability does not affect integrity or availability directly, the immediate operational impact may be limited, but the long-term security posture could be severely weakened. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for external threat actors to conduct reconnaissance and prepare for subsequent attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Monitor network traffic and application logs for unusual or repeated requests that could indicate account enumeration attempts or footprinting activities. 2) Employ web application firewalls (WAFs) with rules designed to detect and block patterns consistent with information disclosure or enumeration attacks targeting enVision. 3) Restrict access to enVision interfaces to trusted IP ranges or via VPNs to reduce exposure to the public internet. 4) Implement rate limiting and anomaly detection on authentication and query endpoints to hinder automated reconnaissance. 5) Conduct regular security assessments and penetration testing focused on information disclosure vectors in enVision deployments. 6) Engage with CBK Soft for updates and patches, and plan for rapid deployment once a fix is released. 7) Educate staff on recognizing phishing and social engineering attempts that may leverage information obtained through this vulnerability. 8) Review and minimize the amount of sensitive information returned in error messages or system responses to reduce observable discrepancies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2025-09-29T08:22:55.571Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fb9152b0116405c2a4da20

Added to database: 10/24/2025, 2:46:42 PM

Last enriched: 10/31/2025, 3:36:08 PM

Last updated: 12/13/2025, 1:13:26 AM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats