CVE-2025-11322: Weak Password Requirements in Mangati NovoSGA
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11322 identifies a vulnerability in Mangati NovoSGA, a software product used for service management, affecting all versions up to 2.2.12. The flaw resides in the User Creation Page component, specifically in the handling of the password (Senha) and password confirmation fields. Due to improper validation or enforcement of password complexity requirements, an attacker can remotely manipulate these fields to create user accounts with weak passwords. This undermines the intended security controls designed to enforce strong credential policies. The vulnerability can be exploited remotely without authentication or user interaction, but the attack complexity is high, indicating that a skilled attacker is required. Although the exploit has been published, no known exploits are currently observed in the wild. The vendor was notified but has not issued a patch or response, leaving affected systems exposed. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, high attack complexity, no privileges or user interaction needed, and limited impact on confidentiality. The vulnerability primarily threatens confidentiality by enabling weak credentials that could be leveraged for unauthorized access or lateral movement within affected environments.
Potential Impact
For European organizations using Mangati NovoSGA, this vulnerability poses a risk of unauthorized account creation with weak passwords, potentially leading to credential compromise and unauthorized access to sensitive service management data. This can result in data breaches, disruption of service management workflows, and potential escalation of privileges if attackers leverage weak credentials to move laterally. The medium severity indicates a moderate risk, but the lack of vendor response and patches increases exposure duration. Organizations in sectors relying heavily on service management platforms, such as public administration, utilities, and large enterprises, may face operational and reputational impacts. Confidentiality is the primary concern, but integrity and availability could be indirectly affected if attackers manipulate service management processes. The remote exploitability without authentication increases the threat surface, especially if the User Creation Page is exposed to untrusted networks or the internet.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include: 1) Restrict network access to the User Creation Page, limiting it to trusted internal networks or VPNs. 2) Implement external strong password policies and validation mechanisms at the network or application gateway level to enforce complexity on account creation requests. 3) Monitor logs for unusual account creation activity or weak password usage. 4) Conduct regular audits of user accounts to identify and remediate weak passwords. 5) Employ multi-factor authentication (MFA) for all accounts created through NovoSGA to mitigate risks from weak passwords. 6) Engage with Mangati for updates and consider alternative solutions if remediation is delayed. 7) Educate administrators on the risks and ensure strict operational procedures around user management. These targeted actions go beyond generic advice by focusing on access controls, monitoring, and compensating authentication mechanisms.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Portugal
CVE-2025-11322: Weak Password Requirements in Mangati NovoSGA
Description
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11322 identifies a vulnerability in Mangati NovoSGA, a software product used for service management, affecting all versions up to 2.2.12. The flaw resides in the User Creation Page component, specifically in the handling of the password (Senha) and password confirmation fields. Due to improper validation or enforcement of password complexity requirements, an attacker can remotely manipulate these fields to create user accounts with weak passwords. This undermines the intended security controls designed to enforce strong credential policies. The vulnerability can be exploited remotely without authentication or user interaction, but the attack complexity is high, indicating that a skilled attacker is required. Although the exploit has been published, no known exploits are currently observed in the wild. The vendor was notified but has not issued a patch or response, leaving affected systems exposed. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, high attack complexity, no privileges or user interaction needed, and limited impact on confidentiality. The vulnerability primarily threatens confidentiality by enabling weak credentials that could be leveraged for unauthorized access or lateral movement within affected environments.
Potential Impact
For European organizations using Mangati NovoSGA, this vulnerability poses a risk of unauthorized account creation with weak passwords, potentially leading to credential compromise and unauthorized access to sensitive service management data. This can result in data breaches, disruption of service management workflows, and potential escalation of privileges if attackers leverage weak credentials to move laterally. The medium severity indicates a moderate risk, but the lack of vendor response and patches increases exposure duration. Organizations in sectors relying heavily on service management platforms, such as public administration, utilities, and large enterprises, may face operational and reputational impacts. Confidentiality is the primary concern, but integrity and availability could be indirectly affected if attackers manipulate service management processes. The remote exploitability without authentication increases the threat surface, especially if the User Creation Page is exposed to untrusted networks or the internet.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include: 1) Restrict network access to the User Creation Page, limiting it to trusted internal networks or VPNs. 2) Implement external strong password policies and validation mechanisms at the network or application gateway level to enforce complexity on account creation requests. 3) Monitor logs for unusual account creation activity or weak password usage. 4) Conduct regular audits of user accounts to identify and remediate weak passwords. 5) Employ multi-factor authentication (MFA) for all accounts created through NovoSGA to mitigate risks from weak passwords. 6) Engage with Mangati for updates and consider alternative solutions if remediation is delayed. 7) Educate administrators on the risks and ensure strict operational procedures around user management. These targeted actions go beyond generic advice by focusing on access controls, monitoring, and compensating authentication mechanisms.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T06:41:05.233Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e35731815f0abbc161fe58
Added to database: 10/6/2025, 5:44:17 AM
Last enriched: 10/6/2025, 5:44:40 AM
Last updated: 1/8/2026, 12:43:18 PM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62877: CWE-1188: Initialization of a Resource with an Insecure Default in SUSE harvester
CriticalCVE-2024-1574: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Mitsubishi Electric Iconics Digital Solutions GENESIS64
MediumCVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
MediumThe State of Trusted Open Source
MediumCVE-2024-1182: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Iconics Digital Solutions GENESIS64
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.