Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15065: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Kings Information & Network Co. KESS Enterprise

0
High
VulnerabilityCVE-2025-15065cvecve-2025-15065cwe-200cwe-311cwe-552
Published: Mon Dec 29 2025 (12/29/2025, 00:09:27 UTC)
Source: CVE Database V5
Vendor/Project: Kings Information & Network Co.
Product: KESS Enterprise

Description

Exposure of Sensitive Information to an Unauthorized Actor, Missing Encryption of Sensitive Data, Files or Directories Accessible to External Parties vulnerability in Kings Information & Network Co. KESS Enterprise on Windows allows Privilege Escalation, Modify Existing Service, Modify Shared File.This issue affects KESS Enterprise: before *.25.9.19.exe

AI-Powered Analysis

AILast updated: 01/07/2026, 00:37:12 UTC

Technical Analysis

CVE-2025-15065 is a vulnerability identified in Kings Information & Network Co.'s KESS Enterprise software running on Windows platforms, affecting versions prior to *.25.9.19.exe. The core issue involves the exposure of sensitive information to unauthorized actors due to missing encryption of sensitive data and improperly secured files or directories accessible externally. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information), CWE-311 (Missing Encryption of Sensitive Data), and CWE-552 (Files or Directories Accessible to External Parties). The flaw allows an attacker with low-level privileges local access to escalate privileges, modify existing services, and alter shared files, thereby compromising system integrity and availability. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), has high attack complexity (AC:H), requires privileges (PR:L), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level with scope change (S:CH), meaning the attacker can affect resources beyond their initial access. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be leveraged for significant internal compromise if an attacker gains initial foothold. The lack of encryption and accessible sensitive files increase the risk of data leakage and unauthorized modifications. The vulnerability is particularly critical in environments where KESS Enterprise manages sensitive or critical operational data. No official patches are currently linked, indicating the need for immediate attention from affected organizations to monitor vendor updates and apply mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-15065 can be substantial. The exposure of sensitive information can lead to data breaches involving personal data, intellectual property, or critical operational information, potentially violating GDPR and other data protection regulations. Privilege escalation and service modification capabilities enable attackers to disrupt business operations, manipulate data, or establish persistent footholds within networks. This can affect availability of services, leading to operational downtime and financial losses. Organizations in sectors such as manufacturing, energy, and critical infrastructure that rely on KESS Enterprise for network and information management are at heightened risk. The vulnerability could facilitate lateral movement within networks, increasing the scope of compromise. Additionally, the absence of encryption for sensitive data raises the risk of interception or unauthorized access, undermining confidentiality and trust. The high attack complexity and requirement for local access somewhat limit remote exploitation but do not eliminate insider threats or attacks leveraging initial access vectors such as phishing or compromised credentials. Overall, the vulnerability poses a serious threat to confidentiality, integrity, and availability of affected systems within European enterprises.

Mitigation Recommendations

1. Immediate implementation of strict access controls and network segmentation to limit local access to systems running KESS Enterprise. 2. Monitor and audit file and directory permissions to ensure sensitive data is not accessible to unauthorized users or external parties. 3. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or service modifications. 4. Enforce the principle of least privilege for all user accounts and services interacting with KESS Enterprise. 5. Encrypt sensitive data at rest and in transit using strong cryptographic protocols, compensating for the missing encryption in the vulnerable software version. 6. Regularly review and update local security policies to prevent unauthorized file sharing or service changes. 7. Stay informed on vendor advisories and apply patches or updates as soon as they become available. 8. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and file access controls within KESS Enterprise environments. 9. Implement multi-factor authentication (MFA) for access to systems hosting KESS Enterprise to reduce risk of credential compromise. 10. Develop and rehearse incident response plans specifically addressing insider threats and local privilege escalation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
FSI
Date Reserved
2025-12-24T04:53:13.499Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b1db813ff03e2bee3c

Added to database: 12/30/2025, 10:22:41 PM

Last enriched: 1/7/2026, 12:37:12 AM

Last updated: 2/7/2026, 11:37:59 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats