Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15068: CWE-862 Missing Authorization in Gmission Web Fax

0
High
VulnerabilityCVE-2025-15068cvecve-2025-15068cwe-862
Published: Mon Dec 29 2025 (12/29/2025, 05:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Gmission
Product: Web Fax

Description

Missing Authorization vulnerability in Gmission Web Fax allows Authentication Abuse, Session Credential Falsification through Manipulation.This issue affects Web Fax: from 3.0 before 3.0.1

AI-Powered Analysis

AILast updated: 01/14/2026, 00:46:00 UTC

Technical Analysis

CVE-2025-15068 is a missing authorization vulnerability classified under CWE-862 affecting Gmission Web Fax version 3.0 prior to 3.0.1. The flaw arises because the application fails to properly enforce authorization checks on certain functions, allowing an attacker to perform authentication abuse and session credential falsification through manipulation of the Web Fax interface. The vulnerability does not require any authentication or user interaction, and can be exploited locally (AV:L), indicating that an attacker with local network access or system access can leverage this issue. The vulnerability impacts confidentiality and integrity with high impact, as unauthorized users can potentially access or manipulate fax transmissions or session data. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) confirms no privileges or user interaction are required, and the vulnerability is straightforward to exploit with low complexity. No patches are currently linked, and no known exploits have been reported in the wild as of publication. The vulnerability is critical for organizations relying on Gmission Web Fax for secure communications, as it undermines trust in session management and authorization controls.

Potential Impact

For European organizations, the vulnerability poses a significant risk to the confidentiality and integrity of fax communications, which may be used for sensitive or regulated information exchange in sectors such as healthcare, legal, finance, and government. Unauthorized access could lead to data leakage, manipulation of faxed documents, or impersonation of legitimate users, potentially causing compliance violations under GDPR and other data protection regulations. The lack of required authentication lowers the barrier for exploitation, increasing the threat surface especially in environments where Web Fax is exposed to internal networks or insufficiently segmented. Disruption or compromise of fax services could also impact business continuity and trust in communication channels. Given the high CVSS score and the critical nature of authorization bypass, organizations face a high risk of targeted attacks or insider threats exploiting this vulnerability.

Mitigation Recommendations

1. Immediately restrict network access to Gmission Web Fax servers to trusted and necessary hosts only, using firewall rules and network segmentation to limit exposure. 2. Implement strict access control lists (ACLs) and monitor access logs for anomalous or unauthorized access attempts. 3. If possible, disable the affected Web Fax service or downgrade usage until a vendor patch or update is available. 4. Employ compensating controls such as multi-factor authentication (MFA) on related systems and enhanced session monitoring to detect suspicious activity. 5. Conduct thorough audits of fax logs and session records to identify any unauthorized access or manipulation. 6. Engage with Gmission support or vendor channels to obtain patches or security advisories and apply updates promptly once available. 7. Educate internal IT and security teams about the vulnerability and ensure incident response plans include scenarios involving fax system compromise. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting Web Fax authorization mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
FSI
Date Reserved
2025-12-24T04:53:24.530Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b5db813ff03e2bf27f

Added to database: 12/30/2025, 10:22:45 PM

Last enriched: 1/14/2026, 12:46:00 AM

Last updated: 2/7/2026, 12:06:08 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats