Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34143: CWE-288 Authentication Bypass Using an Alternate Path or Channel in ETQ Reliance CG (legacy)

0
Critical
VulnerabilityCVE-2025-34143cvecve-2025-34143cwe-288cwe-269cwe-78
Published: Tue Jul 22 2025 (07/22/2025, 12:31:35 UTC)
Source: CVE Database V5
Vendor/Project: ETQ
Product: Reliance CG (legacy)

Description

An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583.

AI-Powered Analysis

AILast updated: 11/04/2025, 23:27:54 UTC

Technical Analysis

CVE-2025-34143 is a critical authentication bypass vulnerability affecting all versions of ETQ Reliance CG (legacy). The vulnerability stems from improper validation logic in the authentication mechanism that allows an attacker to bypass normal login procedures by manipulating the username field to impersonate the internal SYSTEM account. This SYSTEM account does not require a password, enabling unauthenticated attackers with network access to the login interface to gain privileged access. Once authenticated as SYSTEM, the attacker can modify Jython scripts embedded in the application, leading to remote code execution (RCE) on the underlying system. The vulnerability involves multiple CWE categories: CWE-288 (Authentication Bypass by Alternate Path or Channel), CWE-269 (Improper Privilege Management), and CWE-78 (Improper Neutralization of Special Elements used in OS Command). The flaw was addressed in version MP-4583 by introducing stricter validation logic that excludes internal accounts from public authentication workflows, effectively preventing unauthorized SYSTEM logins. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, no required authentication or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability’s characteristics make it highly exploitable and dangerous.

Potential Impact

For European organizations, especially those in sectors such as manufacturing, pharmaceuticals, aerospace, and other regulated industries that rely on ETQ Reliance CG for quality and compliance management, this vulnerability poses a severe risk. Successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary code, manipulate compliance data, disrupt quality control processes, and potentially cause operational downtime or regulatory non-compliance. The ability to bypass authentication without credentials and execute remote code elevates the threat to critical infrastructure and sensitive environments. Additionally, the compromise of such systems could facilitate lateral movement within corporate networks, increasing the risk of broader enterprise impact. Given the criticality and ease of exploitation, organizations face potential data breaches, operational disruptions, and reputational damage if not promptly addressed.

Mitigation Recommendations

Organizations should immediately upgrade ETQ Reliance CG (legacy) to version MP-4583 or later, where the vulnerability has been patched with enhanced validation logic. If immediate patching is not feasible, restrict network access to the login interface by implementing network segmentation, firewall rules, and VPN access controls to limit exposure to trusted users only. Conduct thorough audits of existing user accounts and authentication logs to detect any suspicious login attempts or unauthorized access. Disable or remove legacy systems where possible, or isolate them from critical network segments. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block anomalous authentication requests targeting the SYSTEM account. Regularly monitor for unusual Jython script modifications or other signs of compromise within the application environment. Finally, ensure incident response plans are updated to address potential exploitation scenarios involving ETQ Reliance CG.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.564Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f881fa83201eaac1c0ec8

Added to database: 7/22/2025, 12:46:23 PM

Last enriched: 11/4/2025, 11:27:54 PM

Last updated: 12/3/2025, 7:24:38 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats