Skip to main content

CVE-2025-22956: n/a

High
VulnerabilityCVE-2025-22956cvecve-2025-22956
Published: Mon Sep 08 2025 (09/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OPSI before 4.3 allows any client to retrieve any ProductPropertyState, including those of other clients. This can lead to privilege escalation if any ProductPropertyState contains a secret only intended to be accessible by a subset of clients. One example of this is a domain join account password for the windomain package.

AI-Powered Analysis

AILast updated: 09/08/2025, 13:46:21 UTC

Technical Analysis

CVE-2025-22956 is a vulnerability affecting OPSI (Open PC Server Integration) versions prior to 4.3. OPSI is an open-source client management system widely used for managing software deployment and configuration in enterprise environments. The vulnerability allows any client connected to the OPSI server to retrieve any ProductPropertyState, including those belonging to other clients. ProductPropertyState objects can contain sensitive configuration data or secrets intended to be accessible only by specific clients. For example, the windomain package uses a domain join account password stored as a ProductPropertyState, which should be restricted. Due to improper access controls, an attacker with client access can escalate privileges by obtaining these secrets, potentially allowing unauthorized domain joins or other privileged operations. This vulnerability arises from insufficient authorization checks on the retrieval of ProductPropertyState objects, which breaks the intended client isolation model. Although no known exploits are currently reported in the wild, the flaw presents a significant risk in environments where OPSI is used to manage sensitive credentials or configurations. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed, but the technical details suggest a serious security weakness that could be exploited by authenticated clients without requiring additional user interaction.

Potential Impact

For European organizations using OPSI for client management, this vulnerability could lead to unauthorized access to sensitive credentials such as domain join passwords. This can result in privilege escalation within corporate networks, allowing attackers to add unauthorized machines to the domain or perform other privileged actions. The confidentiality of sensitive configuration data is compromised, potentially leading to lateral movement and further network compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of regulatory non-compliance and reputational damage if such a breach occurs. Additionally, the availability and integrity of managed systems could be affected if attackers manipulate configurations or deploy unauthorized software. The impact is heightened in large-scale deployments where many clients connect to a centralized OPSI server, increasing the attack surface and potential damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade OPSI to version 4.3 or later, where proper access controls on ProductPropertyState retrieval are enforced. Until patching is possible, restrict OPSI client access to trusted users and networks only, implementing network segmentation and strict firewall rules to limit exposure. Review and audit all ProductPropertyState entries for sensitive data, minimizing the use of secrets stored in this manner where possible. Employ strong authentication mechanisms for OPSI clients and monitor logs for unusual access patterns or attempts to retrieve unauthorized data. Additionally, consider implementing application-layer access controls or proxy solutions that enforce client isolation if upgrading is delayed. Regularly review and update OPSI configurations and credentials, rotating sensitive passwords such as domain join accounts to limit the window of exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68bedaaad5a2966cfc7fda08

Added to database: 9/8/2025, 1:31:22 PM

Last enriched: 9/8/2025, 1:46:21 PM

Last updated: 9/9/2025, 12:52:39 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats