Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34140: CWE-639 Authorization Bypass Through User-Controlled Key in ETQ Reliance CG (legacy)

0
High
VulnerabilityCVE-2025-34140cvecve-2025-34140cwe-639
Published: Tue Jul 22 2025 (07/22/2025, 12:34:31 UTC)
Source: CVE Database V5
Vendor/Project: ETQ
Product: Reliance CG (legacy)

Description

An authorization bypass vulnerability exists in ETQ Reliance (legacy CG and NXG SaaS platforms). By appending a specific URI suffix to certain API endpoints, an unauthenticated attacker can bypass access control checks and retrieve limited sensitive resources. The root cause was a misconfiguration in API authorization logic, which has since been corrected in SE.2025.1 and 2025.1.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 23:27:38 UTC

Technical Analysis

CVE-2025-34140 is an authorization bypass vulnerability classified under CWE-639, which involves improper authorization logic allowing unauthorized access to resources. The vulnerability exists in ETQ Reliance legacy CG and NXG SaaS platforms due to a misconfiguration in API authorization mechanisms. Specifically, by appending a crafted URI suffix to certain API endpoints, an attacker without any authentication can circumvent access control checks and retrieve sensitive information that should be restricted. This occurs because the API improperly trusts user-controlled keys or parameters when enforcing authorization, failing to validate them correctly against the user's privileges. The flaw affects all versions of the legacy product, indicating a systemic issue in the authorization design. The vendor has addressed the issue in software editions SE.2025.1 and 2025.1.2 by correcting the authorization logic to properly validate keys and restrict access. The vulnerability has a CVSS 4.0 score of 8.7, reflecting its high impact due to network attack vector, no required privileges or user interaction, and a high confidentiality impact. Although no active exploits have been reported, the ease of exploitation and the sensitive nature of the data accessible make this a critical concern for affected users. ETQ Reliance is widely used in regulated industries for quality, compliance, and risk management, meaning the exposure of sensitive operational data could have significant consequences.

Potential Impact

For European organizations, the impact of CVE-2025-34140 can be substantial, especially for those in regulated sectors such as pharmaceuticals, manufacturing, aerospace, and automotive industries where ETQ Reliance is commonly deployed. Unauthorized access to sensitive compliance and quality management data could lead to intellectual property theft, regulatory non-compliance, and operational disruptions. Confidentiality breaches may expose proprietary processes, audit results, or supplier information, potentially damaging competitive advantage and trust. Since the vulnerability requires no authentication and can be exploited remotely, it increases the risk of widespread data leakage. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exposure of personal or sensitive data through this vulnerability could result in legal penalties and reputational harm. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s characteristics make it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

European organizations should prioritize upgrading ETQ Reliance legacy CG and NXG SaaS platforms to versions SE.2025.1 or 2025.1.2 where the authorization bypass has been fixed. Until patching is complete, organizations should implement compensating controls such as restricting network access to ETQ API endpoints using firewalls or VPNs, and monitoring API traffic for unusual URI patterns that may indicate exploitation attempts. Conduct thorough audits of API authorization logic and configurations to ensure no other endpoints are vulnerable to similar bypasses. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious URI suffixes. Additionally, review and tighten access controls and logging to detect unauthorized access early. Organizations should also engage in vulnerability scanning and penetration testing focused on API security to identify any residual weaknesses. Finally, maintain close communication with ETQ for updates and advisories and prepare incident response plans for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f881fa83201eaac1c0eba

Added to database: 7/22/2025, 12:46:23 PM

Last enriched: 11/4/2025, 11:27:38 PM

Last updated: 12/3/2025, 7:25:20 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats