CVE-2025-15065: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Kings Information & Network Co. KESS Enterprise
Exposure of Sensitive Information to an Unauthorized Actor, Missing Encryption of Sensitive Data, Files or Directories Accessible to External Parties vulnerability in Kings Information & Network Co. KESS Enterprise on Windows allows Privilege Escalation, Modify Existing Service, Modify Shared File.This issue affects KESS Enterprise: before *.25.9.19.exe
AI Analysis
Technical Summary
CVE-2025-15065 is a vulnerability identified in Kings Information & Network Co.'s KESS Enterprise software running on Windows platforms, affecting versions prior to *.25.9.19.exe. The core issue involves the exposure of sensitive information to unauthorized actors due to missing encryption of sensitive data and improperly secured files or directories accessible externally. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information), CWE-311 (Missing Encryption of Sensitive Data), and CWE-552 (Files or Directories Accessible to External Parties). The flaw allows an attacker with low-level privileges local access to escalate privileges, modify existing services, and alter shared files, thereby compromising system integrity and availability. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), has high attack complexity (AC:H), requires privileges (PR:L), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level with scope change (S:CH), meaning the attacker can affect resources beyond their initial access. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be leveraged for significant internal compromise if an attacker gains initial foothold. The lack of encryption and accessible sensitive files increase the risk of data leakage and unauthorized modifications. The vulnerability is particularly critical in environments where KESS Enterprise manages sensitive or critical operational data. No official patches are currently linked, indicating the need for immediate attention from affected organizations to monitor vendor updates and apply mitigations.
Potential Impact
For European organizations, the impact of CVE-2025-15065 can be substantial. The exposure of sensitive information can lead to data breaches involving personal data, intellectual property, or critical operational information, potentially violating GDPR and other data protection regulations. Privilege escalation and service modification capabilities enable attackers to disrupt business operations, manipulate data, or establish persistent footholds within networks. This can affect availability of services, leading to operational downtime and financial losses. Organizations in sectors such as manufacturing, energy, and critical infrastructure that rely on KESS Enterprise for network and information management are at heightened risk. The vulnerability could facilitate lateral movement within networks, increasing the scope of compromise. Additionally, the absence of encryption for sensitive data raises the risk of interception or unauthorized access, undermining confidentiality and trust. The high attack complexity and requirement for local access somewhat limit remote exploitation but do not eliminate insider threats or attacks leveraging initial access vectors such as phishing or compromised credentials. Overall, the vulnerability poses a serious threat to confidentiality, integrity, and availability of affected systems within European enterprises.
Mitigation Recommendations
1. Immediate implementation of strict access controls and network segmentation to limit local access to systems running KESS Enterprise. 2. Monitor and audit file and directory permissions to ensure sensitive data is not accessible to unauthorized users or external parties. 3. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or service modifications. 4. Enforce the principle of least privilege for all user accounts and services interacting with KESS Enterprise. 5. Encrypt sensitive data at rest and in transit using strong cryptographic protocols, compensating for the missing encryption in the vulnerable software version. 6. Regularly review and update local security policies to prevent unauthorized file sharing or service changes. 7. Stay informed on vendor advisories and apply patches or updates as soon as they become available. 8. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and file access controls within KESS Enterprise environments. 9. Implement multi-factor authentication (MFA) for access to systems hosting KESS Enterprise to reduce risk of credential compromise. 10. Develop and rehearse incident response plans specifically addressing insider threats and local privilege escalation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-15065: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Kings Information & Network Co. KESS Enterprise
Description
Exposure of Sensitive Information to an Unauthorized Actor, Missing Encryption of Sensitive Data, Files or Directories Accessible to External Parties vulnerability in Kings Information & Network Co. KESS Enterprise on Windows allows Privilege Escalation, Modify Existing Service, Modify Shared File.This issue affects KESS Enterprise: before *.25.9.19.exe
AI-Powered Analysis
Technical Analysis
CVE-2025-15065 is a vulnerability identified in Kings Information & Network Co.'s KESS Enterprise software running on Windows platforms, affecting versions prior to *.25.9.19.exe. The core issue involves the exposure of sensitive information to unauthorized actors due to missing encryption of sensitive data and improperly secured files or directories accessible externally. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information), CWE-311 (Missing Encryption of Sensitive Data), and CWE-552 (Files or Directories Accessible to External Parties). The flaw allows an attacker with low-level privileges local access to escalate privileges, modify existing services, and alter shared files, thereby compromising system integrity and availability. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), has high attack complexity (AC:H), requires privileges (PR:L), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level with scope change (S:CH), meaning the attacker can affect resources beyond their initial access. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be leveraged for significant internal compromise if an attacker gains initial foothold. The lack of encryption and accessible sensitive files increase the risk of data leakage and unauthorized modifications. The vulnerability is particularly critical in environments where KESS Enterprise manages sensitive or critical operational data. No official patches are currently linked, indicating the need for immediate attention from affected organizations to monitor vendor updates and apply mitigations.
Potential Impact
For European organizations, the impact of CVE-2025-15065 can be substantial. The exposure of sensitive information can lead to data breaches involving personal data, intellectual property, or critical operational information, potentially violating GDPR and other data protection regulations. Privilege escalation and service modification capabilities enable attackers to disrupt business operations, manipulate data, or establish persistent footholds within networks. This can affect availability of services, leading to operational downtime and financial losses. Organizations in sectors such as manufacturing, energy, and critical infrastructure that rely on KESS Enterprise for network and information management are at heightened risk. The vulnerability could facilitate lateral movement within networks, increasing the scope of compromise. Additionally, the absence of encryption for sensitive data raises the risk of interception or unauthorized access, undermining confidentiality and trust. The high attack complexity and requirement for local access somewhat limit remote exploitation but do not eliminate insider threats or attacks leveraging initial access vectors such as phishing or compromised credentials. Overall, the vulnerability poses a serious threat to confidentiality, integrity, and availability of affected systems within European enterprises.
Mitigation Recommendations
1. Immediate implementation of strict access controls and network segmentation to limit local access to systems running KESS Enterprise. 2. Monitor and audit file and directory permissions to ensure sensitive data is not accessible to unauthorized users or external parties. 3. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or service modifications. 4. Enforce the principle of least privilege for all user accounts and services interacting with KESS Enterprise. 5. Encrypt sensitive data at rest and in transit using strong cryptographic protocols, compensating for the missing encryption in the vulnerable software version. 6. Regularly review and update local security policies to prevent unauthorized file sharing or service changes. 7. Stay informed on vendor advisories and apply patches or updates as soon as they become available. 8. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and file access controls within KESS Enterprise environments. 9. Implement multi-factor authentication (MFA) for access to systems hosting KESS Enterprise to reduce risk of credential compromise. 10. Develop and rehearse incident response plans specifically addressing insider threats and local privilege escalation scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- FSI
- Date Reserved
- 2025-12-24T04:53:13.499Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b1db813ff03e2bee3c
Added to database: 12/30/2025, 10:22:41 PM
Last enriched: 1/7/2026, 12:37:12 AM
Last updated: 2/7/2026, 1:01:12 PM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.