Skip to main content

CVE-2025-24021: CWE-862: Missing Authorization in Combodo iTop

Medium
VulnerabilityCVE-2025-24021cvecve-2025-24021cwe-862
Published: Wed May 14 2025 (05/14/2025, 14:48:42 UTC)
Source: CVE
Vendor/Project: Combodo
Product: iTop

Description

iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can set value to object fields when they're not supposed to. Versions 2.7.12, 3.1.3, and 3.2.1 contain a fix for the issue.

AI-Powered Analysis

AILast updated: 08/30/2025, 01:01:50 UTC

Technical Analysis

CVE-2025-24021 is a medium-severity vulnerability identified in Combodo's iTop, a web-based IT Service Management (ITSM) tool widely used for managing IT infrastructure and services. The vulnerability is classified under CWE-862, indicating a Missing Authorization issue. Specifically, in versions prior to 2.7.12, between 3.0.0 and before 3.1.3, and between 3.2.0 and before 3.2.1, any user with portal access—meaning any authenticated user with a portal account—can set or modify object field values that they should not be authorized to change. This lack of proper authorization checks allows users to escalate their privileges within the application context by altering data fields that are typically restricted. The vulnerability does not require user interaction beyond having a valid portal account and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the attacker must have low privileges (PR:L) but no additional user interaction is needed (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to integrity (I:L), with no direct confidentiality or availability impact. The issue was addressed in versions 2.7.12, 3.1.3, and 3.2.1 by implementing proper authorization checks to restrict unauthorized field modifications. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a potential vector for unauthorized data manipulation within ITSM environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on iTop for IT service management and asset tracking. Unauthorized modification of object fields could lead to inaccurate IT asset records, misconfiguration of services, or manipulation of incident and change management data. This can disrupt IT operations, cause compliance issues, and potentially lead to further security incidents if attackers alter critical configuration data or escalate privileges within the ITSM system. The integrity compromise could undermine trust in IT management processes and complicate incident response efforts. While confidentiality and availability are not directly affected, the integrity loss alone can have cascading effects on operational reliability and regulatory compliance, particularly under GDPR and other European data protection frameworks where accurate record-keeping is essential.

Mitigation Recommendations

European organizations using iTop should immediately verify their deployed versions and upgrade to the fixed releases: 2.7.12, 3.1.3, or 3.2.1 as applicable. Beyond patching, organizations should audit portal user accounts to ensure that only necessary personnel have portal access, minimizing the attack surface. Implement strict role-based access controls (RBAC) within iTop to limit field modification permissions to authorized roles only. Regularly review and monitor audit logs for unusual changes to object fields, enabling early detection of unauthorized modifications. Network segmentation can be employed to restrict access to the iTop portal to trusted internal networks or VPN users. Additionally, consider implementing web application firewalls (WAF) with custom rules to detect and block anomalous requests attempting unauthorized field changes. Finally, integrate iTop security monitoring into the organization's broader security information and event management (SIEM) system for comprehensive oversight.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-01-16T17:31:06.459Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec9c6

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 8/30/2025, 1:01:50 AM

Last updated: 9/26/2025, 3:51:59 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats