Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21403: CWE-863: Incorrect Authorization in Microsoft On-Premises Data Gateway

0
Medium
VulnerabilityCVE-2025-21403cvecve-2025-21403cwe-863
Published: Tue Jan 14 2025 (01/14/2025, 18:04:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: On-Premises Data Gateway

Description

On-Premises Data Gateway Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:43:07 UTC

Technical Analysis

CVE-2025-21403 is an authorization vulnerability classified under CWE-863 affecting Microsoft On-Premises Data Gateway version 1.0.0. The flaw arises from incorrect authorization checks within the gateway, potentially allowing an attacker with low privileges and network access to perform actions or access information beyond their intended permissions. The vulnerability requires user interaction, which may involve tricking a legitimate user into performing an action that facilitates the exploit. The CVSS v3.1 vector (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N) indicates that the attack can be executed remotely over the network but with high attack complexity, requiring low privileges and user interaction. The impact on confidentiality and integrity is high, meaning sensitive data could be disclosed or altered, but availability is not affected. The On-Premises Data Gateway is a critical component used by enterprises to securely bridge on-premises data sources with cloud services such as Microsoft Power BI, Power Apps, and Azure Logic Apps. Incorrect authorization in this context could expose sensitive business data or allow unauthorized data manipulation. Although no public exploits or patches are currently available, the vulnerability has been officially published and assigned a CVE identifier, signaling the need for awareness and proactive mitigation. The lack of patches necessitates temporary compensating controls to reduce risk until an official fix is released.

Potential Impact

The vulnerability can lead to unauthorized disclosure and modification of sensitive data managed by the On-Premises Data Gateway, potentially compromising business intelligence, analytics, and operational workflows dependent on accurate data. Organizations using this gateway to connect critical on-premises databases to cloud services may face data breaches, loss of data integrity, and compliance violations. Since the attack requires user interaction and low privileges, insider threats or social engineering attacks could be leveraged to exploit this flaw. The absence of availability impact means systems remain operational, but the confidentiality and integrity breaches could have severe consequences, including intellectual property theft, regulatory penalties, and erosion of customer trust. The medium severity rating suggests a moderate but non-trivial risk that should be addressed promptly, especially in environments with sensitive or regulated data.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls and monitoring around the On-Premises Data Gateway. Limit user privileges to the minimum necessary and enforce multi-factor authentication to reduce the risk of unauthorized access. Educate users to recognize and avoid social engineering attempts that could trigger the required user interaction for exploitation. Network segmentation and firewall rules should restrict access to the gateway to trusted hosts and networks only. Enable detailed logging and anomaly detection to identify suspicious activities related to the gateway. Regularly review and audit permissions assigned within the gateway configuration. Consider temporarily disabling non-essential features or connections that increase the attack surface. Stay informed through Microsoft security advisories for updates and apply patches promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd549ed239a66badec6c

Added to database: 9/9/2025, 11:50:44 PM

Last enriched: 2/26/2026, 11:43:07 PM

Last updated: 3/24/2026, 5:17:57 PM

Views: 496

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses