Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon

0
Medium
VulnerabilityCVE-2025-11906cvecve-2025-11906cwe-732
Published: Thu Oct 30 2025 (10/30/2025, 07:39:38 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: Flowmon

Description

A vulnerability exists in Progress Flowmon versions prior 12.5.6 where certain system configuration files have incorrect file permissions, allowing a user with access to the default flowmon system user account used for SSH access to potentially escalate privileges to root during service initialization.

AI-Powered Analysis

AILast updated: 11/06/2025, 11:11:49 UTC

Technical Analysis

CVE-2025-11906 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Progress Software's Flowmon product versions prior to 12.5.6. The issue arises because certain system configuration files have improperly set file permissions, allowing users who have access to the default Flowmon system user account—commonly used for SSH access—to escalate their privileges to root during the service initialization process. This escalation occurs because the service initialization process reads or modifies these configuration files without adequate permission checks, enabling a local privilege escalation attack. The vulnerability requires an attacker to have legitimate access to the default system user account, which typically has limited privileges. However, once exploited, the attacker gains full root privileges, compromising the confidentiality, integrity, and availability of the system. The CVSS 3.1 score of 6.7 reflects a medium severity, with attack vector local, low attack complexity, high privileges required, no user interaction, and impact on all three security aspects. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where the default system user account is accessible or poorly managed. The flaw underscores the importance of correct permission settings on critical system files and the risks of default accounts with SSH access.

Potential Impact

For European organizations, this vulnerability could lead to full system compromise if an attacker gains access to the default Flowmon system user account. Given Flowmon’s role in network monitoring and security analytics, a successful exploit could allow attackers to manipulate monitoring data, disable detection capabilities, or use the compromised system as a pivot point for further attacks within the network. This impacts the confidentiality of sensitive network data, the integrity of monitoring results, and the availability of critical security infrastructure. Organizations in sectors with high reliance on network monitoring—such as telecommunications, finance, energy, and government—face increased risks. The requirement for existing access to the default system user account limits the attack surface but also highlights the criticality of managing and securing privileged accounts. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should immediately upgrade Flowmon to version 12.5.6 or later, where this vulnerability is addressed. Until patching is possible, restrict SSH access to the default Flowmon system user account by implementing strict access controls, such as IP whitelisting, multi-factor authentication, and network segmentation. Review and harden file permissions on Flowmon system configuration files to ensure they are not writable or accessible by non-privileged users. Disable or rename default system user accounts if possible to reduce attack surface. Conduct regular audits of user accounts and SSH access logs to detect unauthorized access attempts. Employ host-based intrusion detection systems to monitor for suspicious privilege escalation activities. Additionally, integrate Flowmon monitoring with centralized security information and event management (SIEM) solutions to enable rapid detection and response. Finally, educate administrators on the risks of default accounts and the importance of secure configuration management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-10-17T10:50:29.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690319b962f3017fc2134dce

Added to database: 10/30/2025, 7:54:33 AM

Last enriched: 11/6/2025, 11:11:49 AM

Last updated: 12/14/2025, 12:48:09 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats