CVE-2025-14349: CWE-267 Privilege Defined With Unsafe Actions in Universal Software Inc. FlexCity/Kiosk
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
AI Analysis
Technical Summary
CVE-2025-14349 is a vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) and CWE-306 (Missing Authentication for Critical Function) affecting Universal Software Inc.'s FlexCity/Kiosk product versions prior to 1.0.36. The core issue arises from improperly defined privileges that allow unsafe actions and critical functions that lack proper authentication controls. This results in unauthorized users with low-level privileges being able to escalate their privileges by accessing functionality not properly constrained by access control lists (ACLs). The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system, potentially allowing attackers to manipulate kiosk operations, access sensitive data, or disrupt services. Although no exploits have been observed in the wild yet, the vulnerability’s characteristics and high CVSS score (8.8) indicate a significant threat once weaponized. The affected product is typically deployed in urban environments for public services, making it a critical target for attackers aiming to disrupt city infrastructure or gain unauthorized access to public service systems.
Potential Impact
For European organizations, especially municipalities and public service providers using FlexCity/Kiosk systems, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive user data collected via kiosks, manipulation or disruption of public services, and potential cascading effects on urban infrastructure relying on these kiosks. The high impact on confidentiality, integrity, and availability could undermine public trust and lead to regulatory penalties under GDPR if personal data is compromised. Additionally, disruption of kiosk services could affect critical public functions such as ticketing, information dissemination, or access control in public spaces. The ease of exploitation without user interaction and from a network perspective increases the likelihood of attacks, particularly in environments with insufficient network segmentation or weak perimeter defenses.
Mitigation Recommendations
1. Immediately plan and apply updates or patches from Universal Software Inc. once they become available to address this vulnerability. 2. Until patches are released, implement strict network segmentation to isolate FlexCity/Kiosk systems from general network access, limiting exposure to potential attackers. 3. Enforce strong access control policies and monitor for unauthorized privilege escalations or anomalous access patterns within kiosk management interfaces. 4. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect attempts to exploit privilege escalation or unauthorized access. 5. Conduct regular security audits and penetration testing focused on access control mechanisms of the kiosks. 6. Consider implementing multi-factor authentication for administrative functions if supported by the product. 7. Maintain comprehensive logging and alerting to quickly identify and respond to suspicious activities. 8. Engage with the vendor for guidance and early access to patches or workarounds.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-14349: CWE-267 Privilege Defined With Unsafe Actions in Universal Software Inc. FlexCity/Kiosk
Description
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
AI-Powered Analysis
Technical Analysis
CVE-2025-14349 is a vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) and CWE-306 (Missing Authentication for Critical Function) affecting Universal Software Inc.'s FlexCity/Kiosk product versions prior to 1.0.36. The core issue arises from improperly defined privileges that allow unsafe actions and critical functions that lack proper authentication controls. This results in unauthorized users with low-level privileges being able to escalate their privileges by accessing functionality not properly constrained by access control lists (ACLs). The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system, potentially allowing attackers to manipulate kiosk operations, access sensitive data, or disrupt services. Although no exploits have been observed in the wild yet, the vulnerability’s characteristics and high CVSS score (8.8) indicate a significant threat once weaponized. The affected product is typically deployed in urban environments for public services, making it a critical target for attackers aiming to disrupt city infrastructure or gain unauthorized access to public service systems.
Potential Impact
For European organizations, especially municipalities and public service providers using FlexCity/Kiosk systems, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive user data collected via kiosks, manipulation or disruption of public services, and potential cascading effects on urban infrastructure relying on these kiosks. The high impact on confidentiality, integrity, and availability could undermine public trust and lead to regulatory penalties under GDPR if personal data is compromised. Additionally, disruption of kiosk services could affect critical public functions such as ticketing, information dissemination, or access control in public spaces. The ease of exploitation without user interaction and from a network perspective increases the likelihood of attacks, particularly in environments with insufficient network segmentation or weak perimeter defenses.
Mitigation Recommendations
1. Immediately plan and apply updates or patches from Universal Software Inc. once they become available to address this vulnerability. 2. Until patches are released, implement strict network segmentation to isolate FlexCity/Kiosk systems from general network access, limiting exposure to potential attackers. 3. Enforce strong access control policies and monitor for unauthorized privilege escalations or anomalous access patterns within kiosk management interfaces. 4. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect attempts to exploit privilege escalation or unauthorized access. 5. Conduct regular security audits and penetration testing focused on access control mechanisms of the kiosks. 6. Consider implementing multi-factor authentication for administrative functions if supported by the product. 7. Maintain comprehensive logging and alerting to quickly identify and respond to suspicious activities. 8. Engage with the vendor for guidance and early access to patches or workarounds.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TR-CERT
- Date Reserved
- 2025-12-09T15:35:48.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698f2856c9e1ff5ad831b991
Added to database: 2/13/2026, 1:34:14 PM
Last enriched: 2/13/2026, 1:49:08 PM
Last updated: 2/13/2026, 6:02:16 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.