Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14349: CWE-267 Privilege Defined With Unsafe Actions in Universal Software Inc. FlexCity/Kiosk

0
High
VulnerabilityCVE-2025-14349cvecve-2025-14349cwe-267cwe-306
Published: Fri Feb 13 2026 (02/13/2026, 13:09:43 UTC)
Source: CVE Database V5
Vendor/Project: Universal Software Inc.
Product: FlexCity/Kiosk

Description

Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

AI-Powered Analysis

AILast updated: 02/13/2026, 13:49:08 UTC

Technical Analysis

CVE-2025-14349 is a vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) and CWE-306 (Missing Authentication for Critical Function) affecting Universal Software Inc.'s FlexCity/Kiosk product versions prior to 1.0.36. The core issue arises from improperly defined privileges that allow unsafe actions and critical functions that lack proper authentication controls. This results in unauthorized users with low-level privileges being able to escalate their privileges by accessing functionality not properly constrained by access control lists (ACLs). The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system, potentially allowing attackers to manipulate kiosk operations, access sensitive data, or disrupt services. Although no exploits have been observed in the wild yet, the vulnerability’s characteristics and high CVSS score (8.8) indicate a significant threat once weaponized. The affected product is typically deployed in urban environments for public services, making it a critical target for attackers aiming to disrupt city infrastructure or gain unauthorized access to public service systems.

Potential Impact

For European organizations, especially municipalities and public service providers using FlexCity/Kiosk systems, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive user data collected via kiosks, manipulation or disruption of public services, and potential cascading effects on urban infrastructure relying on these kiosks. The high impact on confidentiality, integrity, and availability could undermine public trust and lead to regulatory penalties under GDPR if personal data is compromised. Additionally, disruption of kiosk services could affect critical public functions such as ticketing, information dissemination, or access control in public spaces. The ease of exploitation without user interaction and from a network perspective increases the likelihood of attacks, particularly in environments with insufficient network segmentation or weak perimeter defenses.

Mitigation Recommendations

1. Immediately plan and apply updates or patches from Universal Software Inc. once they become available to address this vulnerability. 2. Until patches are released, implement strict network segmentation to isolate FlexCity/Kiosk systems from general network access, limiting exposure to potential attackers. 3. Enforce strong access control policies and monitor for unauthorized privilege escalations or anomalous access patterns within kiosk management interfaces. 4. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect attempts to exploit privilege escalation or unauthorized access. 5. Conduct regular security audits and penetration testing focused on access control mechanisms of the kiosks. 6. Consider implementing multi-factor authentication for administrative functions if supported by the product. 7. Maintain comprehensive logging and alerting to quickly identify and respond to suspicious activities. 8. Engage with the vendor for guidance and early access to patches or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-12-09T15:35:48.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698f2856c9e1ff5ad831b991

Added to database: 2/13/2026, 1:34:14 PM

Last enriched: 2/13/2026, 1:49:08 PM

Last updated: 2/13/2026, 6:02:16 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats