Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25236: CWE-204 Observable Discrepancy Response in Omnissa Omnissa Workspace ONE UEM

0
Medium
VulnerabilityCVE-2025-25236cvecve-2025-25236cwe-204
Published: Wed Nov 12 2025 (11/12/2025, 17:41:57 UTC)
Source: CVE Database V5
Vendor/Project: Omnissa
Product: Omnissa Workspace ONE UEM

Description

Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerability. A malicious actor may be able to enumerate sensitive information such as tenant ID and user accounts that could facilitate brute-force, password-spraying or credential-stuffing attacks.

AI-Powered Analysis

AILast updated: 11/19/2025, 19:04:59 UTC

Technical Analysis

CVE-2025-25236 is an information disclosure vulnerability classified under CWE-204 (Observable Discrepancy Response) found in Omnissa Workspace ONE UEM. The vulnerability arises from inconsistent or distinguishable responses from the system when queried with different inputs, allowing an unauthenticated attacker to enumerate sensitive data such as tenant IDs and user accounts. This enumeration can be leveraged to identify valid accounts and tenant identifiers, which are critical for targeted credential-based attacks like brute-force, password spraying, or credential stuffing. The vulnerability affects multiple versions of Omnissa Workspace ONE UEM prior to 24.10.0.25, 24.6.0.44, and 24.2.0.36, indicating that it spans several recent releases. The CVSS 3.1 base score is 5.3, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). This means the vulnerability can be exploited remotely without authentication or user interaction, but the impact is limited to information disclosure. No public exploits are known at this time, but the vulnerability could facilitate further attacks by providing attackers with valuable reconnaissance data. The lack of patch links suggests that organizations should monitor Omnissa advisories for updates and apply patches promptly once available.

Potential Impact

For European organizations, the primary impact of CVE-2025-25236 is the potential exposure of sensitive tenant and user account information, which can significantly aid attackers in mounting credential-based attacks. Such attacks can lead to unauthorized access, data breaches, and lateral movement within enterprise environments. Organizations relying on Omnissa Workspace ONE UEM for unified endpoint management may face increased risk of account compromise, especially if multi-factor authentication is not enforced or if password hygiene is poor. The vulnerability does not directly affect system integrity or availability but indirectly increases risk by enabling reconnaissance. Given the widespread use of endpoint management solutions in sectors such as finance, healthcare, and government across Europe, exploitation could lead to significant operational disruptions and data loss. Additionally, the exposure of tenant IDs may facilitate targeted attacks against specific organizations or subsidiaries, increasing the threat landscape complexity. The medium severity rating indicates that while immediate damage is limited, the vulnerability can be a stepping stone for more severe attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Omnissa’s official channels for patches addressing CVE-2025-25236 and apply updates to affected Workspace ONE UEM versions as soon as they become available. 2) In the interim, restrict access to the Workspace ONE UEM management interfaces using network segmentation, VPNs, and IP whitelisting to reduce exposure to unauthenticated remote attackers. 3) Implement robust multi-factor authentication (MFA) for all user accounts to mitigate the risk of credential-based attacks facilitated by enumeration. 4) Enhance logging and monitoring to detect unusual authentication attempts, such as rapid login failures or password spraying patterns, and respond promptly. 5) Conduct regular user account audits to identify and disable inactive or unnecessary accounts, reducing the attack surface. 6) Educate users on strong password practices and consider deploying account lockout policies to limit brute-force attempts. 7) Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block enumeration attempts based on anomalous request patterns. 8) Review and harden API endpoints and error handling mechanisms to minimize observable discrepancies that could leak information. These targeted measures go beyond generic advice by focusing on reducing the attack surface and detecting exploitation attempts specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Omnissa
Date Reserved
2025-02-04T20:59:07.334Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914cdd8e9dc40953be8734e

Added to database: 11/12/2025, 6:11:36 PM

Last enriched: 11/19/2025, 7:04:59 PM

Last updated: 12/27/2025, 11:18:08 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats