Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13953: CWE-290 Authentication Bypass by Spoofing in GTT Sistema de Información Tributario

0
Critical
VulnerabilityCVE-2025-13953cvecve-2025-13953cwe-290
Published: Wed Dec 10 2025 (12/10/2025, 11:27:40 UTC)
Source: CVE Database V5
Vendor/Project: GTT
Product: Sistema de Información Tributario

Description

Bypass vulnerability in the authentication method in the GTT Tax Information System application, related to the Active Directory (LDAP) login method. Authentication is performed through a local WebSocket, but the web application does not properly validate the authenticity or origin of the data received, allowing an attacker with access to the local machine or internal network to impersonate the legitimate WebSocket and inject manipulated information. Exploiting this vulnerability could allow an attacker to authenticate as any user in the domain, without the need for valid credentials, compromising the confidentiality, integrity, and availability of the application and its data.

AI-Powered Analysis

AILast updated: 12/17/2025, 12:51:41 UTC

Technical Analysis

CVE-2025-13953 is a critical authentication bypass vulnerability identified in the GTT Sistema de Información Tributario, a tax information system application widely used for managing tax data and authentication via Active Directory (LDAP). The vulnerability stems from the application's use of a local WebSocket to perform authentication, where the application fails to properly validate the authenticity or origin of data received through this channel. This flaw allows an attacker who has access to the local machine or internal network to spoof the WebSocket connection by injecting manipulated data. Consequently, the attacker can impersonate any user within the domain and gain unauthorized access without needing valid credentials. This bypass compromises the confidentiality of sensitive tax data, the integrity of the system by allowing unauthorized changes, and the availability by potentially disrupting legitimate access. The vulnerability affects all versions of the product and has been assigned a CVSS 4.0 score of 9.3, reflecting a network-based attack vector with no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the ease of exploitation and critical nature of the affected system make this a significant threat. The root cause is inadequate validation of WebSocket data origin and authenticity, which should be addressed by implementing strict origin checks, authentication tokens, or mutual TLS for WebSocket connections. Additionally, internal network access controls and monitoring are essential to detect and prevent exploitation attempts.

Potential Impact

For European organizations, particularly tax authorities and financial institutions using the GTT Sistema de Información Tributario, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive tax data, enabling data theft, fraud, or manipulation of tax records. The ability to authenticate as any domain user without credentials threatens the entire domain's security, potentially allowing lateral movement and further compromise of internal systems. This could result in significant financial losses, regulatory penalties under GDPR due to data breaches, and erosion of public trust in government services. The disruption of tax information systems could also impact critical government operations and citizen services. Given the critical nature of tax data and the central role of such systems, the impact extends beyond individual organizations to national economic and security concerns. The vulnerability's network-based attack vector and lack of required privileges mean that even insider threats or compromised internal devices could exploit it, increasing the threat surface within European networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement multiple layers of defense: 1) Apply strict validation of WebSocket connections by enforcing origin checks and verifying authentication tokens or implementing mutual TLS to ensure only legitimate clients can establish connections. 2) Restrict internal network access to the tax information system using network segmentation and firewall rules to limit exposure to trusted devices and users. 3) Monitor authentication logs and WebSocket traffic for anomalies indicative of spoofing or injection attempts, employing intrusion detection systems tailored to WebSocket protocols. 4) Enforce strong endpoint security to prevent local machine compromise, including up-to-date antivirus, endpoint detection and response (EDR), and regular patching. 5) Engage with the vendor (GTT) for patches or updates addressing this vulnerability as they become available, and plan for rapid deployment. 6) Conduct regular security audits and penetration testing focused on internal network and WebSocket communication security. 7) Educate internal users about the risks of internal network threats and enforce strict access controls and least privilege principles. These measures, combined, reduce the likelihood of successful exploitation and limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-12-03T13:11:09.892Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69395cf9e27bef3ae4bfd886

Added to database: 12/10/2025, 11:43:53 AM

Last enriched: 12/17/2025, 12:51:41 PM

Last updated: 2/7/2026, 4:19:16 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats