Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22729: Missing Authorization in Infomaniak Network VOD Infomaniak

0
Unknown
VulnerabilityCVE-2025-22729cvecve-2025-22729
Published: Wed Jan 15 2025 (01/15/2025, 15:23:36 UTC)
Source: CVE Database V5
Vendor/Project: Infomaniak Network
Product: VOD Infomaniak

Description

Missing Authorization vulnerability in Infomaniak Network VOD Infomaniak vod-infomaniak allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VOD Infomaniak: from n/a through <= 1.5.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:42:17 UTC

Technical Analysis

CVE-2025-22729 identifies a missing authorization vulnerability in the VOD Infomaniak product developed by Infomaniak Network, affecting all versions up to and including 1.5.9. The vulnerability arises from incorrectly configured access control security levels, which fail to properly enforce authorization checks on certain resources or operations within the video-on-demand platform. This misconfiguration allows attackers to bypass intended access restrictions, potentially accessing or manipulating sensitive content or administrative functions without proper credentials. Although no exploits have been observed in the wild, the nature of missing authorization issues typically makes them attractive targets for attackers seeking unauthorized access. The vulnerability does not have an assigned CVSS score, but the absence of authentication requirements and the broad scope of affected versions indicate a significant security risk. The issue was reserved and published in early 2025, with no patches currently linked, suggesting that organizations must monitor for updates and apply them promptly. The vulnerability primarily threatens the confidentiality and integrity of data handled by the VOD platform, as unauthorized users could view or alter protected content or settings. The lack of detailed CWE classification limits deeper technical insight, but the core problem is a failure in enforcing proper access control policies.

Potential Impact

The missing authorization vulnerability in VOD Infomaniak can lead to unauthorized access to restricted video content, user data, or administrative functions, compromising confidentiality and integrity. Organizations relying on this platform may face data breaches, content leakage, or unauthorized modifications, potentially damaging their reputation and violating privacy regulations. The absence of authentication requirements for exploitation increases the attack surface, allowing remote attackers to exploit the flaw without user credentials or interaction. This could lead to service misuse, unauthorized content distribution, or further pivoting into internal networks if the platform is integrated with other systems. Although availability impact is less likely, unauthorized changes could disrupt service operations. The vulnerability affects all users of the affected versions worldwide, with a higher risk for organizations in sectors relying heavily on video content delivery, such as media, education, and entertainment. The lack of known exploits currently provides a window for mitigation before widespread attacks occur.

Mitigation Recommendations

Organizations using VOD Infomaniak should immediately audit their access control configurations to identify and remediate any improperly enforced authorization checks. Until an official patch is released, consider implementing compensating controls such as network segmentation to restrict access to the VOD platform, strict firewall rules limiting inbound traffic, and enhanced monitoring for unusual access patterns. Employ multi-factor authentication (MFA) for administrative interfaces to reduce risk from unauthorized access. Regularly review user permissions and remove unnecessary privileges. Engage with Infomaniak Network for timely updates and patches addressing this vulnerability. Additionally, conduct penetration testing focused on access control mechanisms to detect similar weaknesses. Maintain comprehensive logging and alerting on access attempts to sensitive resources to enable rapid incident response if exploitation is attempted. Finally, educate staff about the risks of unauthorized access and the importance of secure configuration management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T21:04:12.249Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7604e6bfc5ba1df08f27

Added to database: 4/1/2026, 7:46:12 PM

Last enriched: 4/2/2026, 10:42:17 AM

Last updated: 4/6/2026, 9:41:23 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses