Skip to main content

CVE-2025-2412: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft QR Menu

High
VulnerabilityCVE-2025-2412cvecve-2025-2412cwe-307
Published: Mon Sep 01 2025 (09/01/2025, 12:48:50 UTC)
Source: CVE Database V5
Vendor/Project: Akinsoft
Product: QR Menu

Description

Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft QR Menu allows Authentication Bypass.This issue affects QR Menu: from s1.05.07 before v1.05.12.

AI-Powered Analysis

AILast updated: 09/01/2025, 13:17:42 UTC

Technical Analysis

CVE-2025-2412 is a high-severity vulnerability identified in the Akinsoft QR Menu software, specifically affecting versions from s1.05.07 up to but not including v1.05.12. The vulnerability is classified under CWE-307, which pertains to the improper restriction of excessive authentication attempts. This flaw allows an attacker to bypass authentication mechanisms by exploiting the lack of effective rate limiting or lockout controls on login attempts. Because the vulnerability requires no privileges and no user interaction, it can be exploited remotely over the network (AV:N, PR:N, UI:N). The CVSS v3.1 base score is 8.6, reflecting a high impact on confidentiality (C:H), with limited impact on integrity (I:L) and availability (A:L). The vulnerability enables attackers to gain unauthorized access to the QR Menu system, potentially exposing sensitive customer or business data and allowing unauthorized actions within the application. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. The QR Menu product is typically used in hospitality and retail sectors to provide digital menus via QR codes, meaning compromised systems could lead to data breaches or manipulation of menu content and ordering processes.

Potential Impact

For European organizations, especially those in the hospitality, restaurant, and retail sectors that utilize Akinsoft QR Menu, this vulnerability poses a significant risk. Unauthorized access could lead to exposure of customer data, including personal and payment information, violating GDPR and other data protection regulations. Additionally, attackers could manipulate menu data or ordering workflows, causing reputational damage and financial losses. The high confidentiality impact combined with ease of exploitation means attackers could operate stealthily without detection. Given the widespread adoption of QR-based digital menus in Europe, the vulnerability could disrupt business operations and erode customer trust. Furthermore, compromised systems might be leveraged as footholds for broader network intrusions, increasing the risk to connected enterprise systems.

Mitigation Recommendations

Organizations should immediately assess their use of Akinsoft QR Menu and identify affected versions (s1.05.07 to before v1.05.12). Until an official patch is released, implement compensating controls such as deploying web application firewalls (WAFs) with rules to detect and block brute-force or rapid authentication attempts. Rate limiting and IP blacklisting should be enforced at the network perimeter. Multi-factor authentication (MFA) should be enabled if supported by the product or integrated at the network level. Monitoring and alerting for unusual authentication patterns must be established. Segmentation of the QR Menu system from critical internal networks can limit lateral movement if compromised. Organizations should also maintain up-to-date backups and prepare incident response plans tailored to potential authentication bypass scenarios. Regularly check for vendor updates or patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2025-03-17T13:14:44.610Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b59972ad5a09ad00cf4509

Added to database: 9/1/2025, 1:02:42 PM

Last enriched: 9/1/2025, 1:17:42 PM

Last updated: 9/3/2025, 12:34:09 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats