CVE-2025-12461: CWE-522 Insufficiently Protected Credentials in Grupo Castilla Epsilon RH
This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the configuration of the product by knowing which modules are installed.
AI Analysis
Technical Summary
CVE-2025-12461 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Grupo Castilla's Epsilon RH product, specifically version 3.03.36.0185. The flaw arises from a lack of access control on the application path ‘…/epsilonnet/License/About.aspx’, which allows unauthenticated attackers to retrieve sensitive information about the software license and configuration, including details on installed modules. This information disclosure can facilitate attackers in understanding the target environment, potentially enabling more sophisticated attacks or exploitation of other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack can be performed over the network with low complexity and no privileges or user interaction required, but the impact is limited to confidentiality loss of license and configuration data. No patches or known exploits have been reported yet, but the exposure of internal configuration details can be leveraged in targeted attacks or social engineering. The vulnerability was assigned and published by INCIBE on October 29, 2025.
Potential Impact
For European organizations using Grupo Castilla's Epsilon RH, this vulnerability poses a risk of unauthorized disclosure of sensitive license and configuration information. Such data leakage can undermine confidentiality, potentially revealing internal software deployment details that attackers can use to tailor attacks or identify other vulnerabilities. While the vulnerability does not directly compromise system integrity or availability, the exposed information could facilitate lateral movement or privilege escalation attempts. Organizations in sectors with strict data protection requirements, such as finance, healthcare, or government, may face compliance risks if this information is leveraged in broader attacks. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. Although no active exploits are known, the vulnerability could be targeted by opportunistic attackers or incorporated into multi-stage attack chains, especially in environments where Epsilon RH is widely deployed.
Mitigation Recommendations
To mitigate CVE-2025-12461, organizations should immediately review and restrict access controls on the ‘…/epsilonnet/License/About.aspx’ endpoint to ensure it is not accessible without proper authentication and authorization. Implementing role-based access control (RBAC) or similar mechanisms to protect sensitive application paths is critical. Network-level controls such as web application firewalls (WAFs) can be configured to block unauthorized requests to this path. Monitoring and logging access to sensitive URLs should be enhanced to detect and respond to suspicious activity promptly. If possible, upgrade to a patched version once available or apply vendor-provided workarounds. Conduct internal audits of the application to identify other endpoints lacking adequate access controls. Additionally, educate IT staff and users about the risks of information disclosure and ensure that sensitive configuration details are not unnecessarily exposed in application responses or error messages.
Affected Countries
Spain, Portugal, France, Italy, Germany
CVE-2025-12461: CWE-522 Insufficiently Protected Credentials in Grupo Castilla Epsilon RH
Description
This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the configuration of the product by knowing which modules are installed.
AI-Powered Analysis
Technical Analysis
CVE-2025-12461 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Grupo Castilla's Epsilon RH product, specifically version 3.03.36.0185. The flaw arises from a lack of access control on the application path ‘…/epsilonnet/License/About.aspx’, which allows unauthenticated attackers to retrieve sensitive information about the software license and configuration, including details on installed modules. This information disclosure can facilitate attackers in understanding the target environment, potentially enabling more sophisticated attacks or exploitation of other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack can be performed over the network with low complexity and no privileges or user interaction required, but the impact is limited to confidentiality loss of license and configuration data. No patches or known exploits have been reported yet, but the exposure of internal configuration details can be leveraged in targeted attacks or social engineering. The vulnerability was assigned and published by INCIBE on October 29, 2025.
Potential Impact
For European organizations using Grupo Castilla's Epsilon RH, this vulnerability poses a risk of unauthorized disclosure of sensitive license and configuration information. Such data leakage can undermine confidentiality, potentially revealing internal software deployment details that attackers can use to tailor attacks or identify other vulnerabilities. While the vulnerability does not directly compromise system integrity or availability, the exposed information could facilitate lateral movement or privilege escalation attempts. Organizations in sectors with strict data protection requirements, such as finance, healthcare, or government, may face compliance risks if this information is leveraged in broader attacks. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. Although no active exploits are known, the vulnerability could be targeted by opportunistic attackers or incorporated into multi-stage attack chains, especially in environments where Epsilon RH is widely deployed.
Mitigation Recommendations
To mitigate CVE-2025-12461, organizations should immediately review and restrict access controls on the ‘…/epsilonnet/License/About.aspx’ endpoint to ensure it is not accessible without proper authentication and authorization. Implementing role-based access control (RBAC) or similar mechanisms to protect sensitive application paths is critical. Network-level controls such as web application firewalls (WAFs) can be configured to block unauthorized requests to this path. Monitoring and logging access to sensitive URLs should be enhanced to detect and respond to suspicious activity promptly. If possible, upgrade to a patched version once available or apply vendor-provided workarounds. Conduct internal audits of the application to identify other endpoints lacking adequate access controls. Additionally, educate IT staff and users about the risks of information disclosure and ensure that sensitive configuration details are not unnecessarily exposed in application responses or error messages.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-10-29T10:23:47.181Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6901f6a28cf71dc7fdc086b5
Added to database: 10/29/2025, 11:12:34 AM
Last enriched: 10/29/2025, 11:21:07 AM
Last updated: 10/30/2025, 3:46:58 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61116: n/a
UnknownCVE-2025-61113: n/a
UnknownCVE-2025-46363: CWE-23: Relative Path Traversal in Dell Secure Connect Gateway SCG 5.0 Application and Appliance
MediumCVE-2025-61115: n/a
UnknownCVE-2025-36592: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dell Secure Connect Gateway SCG Policy Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.