CVE-2025-34180: CWE-257 Storing Passwords in a Recoverable Format in NetSupport Software Manager
NetSupport Manager < 14.12.0001 relies on a shared Gateway Key for authentication between Manager/Control, Client, and Connectivity Server components. The key is stored using a reversible encoding scheme. An attacker who obtains access to a deployed client configuration file can decode the stored value to recover the plaintext Gateway Key. Possession of the Gateway Key allows unauthorized access to NetSupport Manager connectivity services and enables remote control of systems managed through the same key.
AI Analysis
Technical Summary
CVE-2025-34180 affects NetSupport Manager versions earlier than 14.12.0001 and involves improper storage of the shared Gateway Key used for authentication between Manager/Control, Client, and Connectivity Server components. Instead of securely hashing or encrypting the key, the software uses a reversible encoding scheme, effectively storing the key in a recoverable format. An attacker who gains access to a deployed client configuration file can decode the stored Gateway Key to obtain its plaintext value. With possession of this key, the attacker can authenticate to NetSupport Manager connectivity services, bypassing normal authentication controls. This enables unauthorized remote control over systems managed by the compromised key, potentially allowing lateral movement, data exfiltration, or disruption of managed endpoints. The vulnerability requires local access to configuration files, which may be obtained through other means such as phishing, malware, or insider threats. No user interaction or elevated privileges beyond local read access are necessary, increasing the risk in environments where endpoint security is weak. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H) indicates a local attack vector with low complexity, no attack prerequisites, and high impact on confidentiality and integrity. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to organizations relying on NetSupport Manager for remote administration, especially in sectors where remote control of endpoints is critical.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized remote access and control of critical systems, resulting in potential data breaches, operational disruption, and loss of trust. Sectors such as finance, healthcare, government, and critical infrastructure that use NetSupport Manager for remote support and management are particularly at risk. The ability to recover the Gateway Key compromises the confidentiality and integrity of the authentication mechanism, allowing attackers to impersonate legitimate management clients. This could facilitate lateral movement within networks, enabling attackers to escalate privileges or exfiltrate sensitive data. Additionally, compromised systems could be manipulated to disrupt services or deploy further malware. The local access requirement somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient endpoint protection or insider threats. The high CVSS score reflects the potential for significant impact if exploited. European organizations must consider the risk of supply chain attacks or insider misuse that could leverage this vulnerability.
Mitigation Recommendations
Organizations should immediately upgrade NetSupport Manager to version 14.12.0001 or later, where this vulnerability is addressed by eliminating reversible encoding of the Gateway Key. Until patching is possible, restrict access to client configuration files by enforcing strict file system permissions and using endpoint protection solutions to detect unauthorized access attempts. Implement network segmentation to limit the exposure of NetSupport Manager connectivity services. Monitor logs for unusual authentication attempts or remote control sessions. Employ strong endpoint security controls to prevent malware or insider threats from accessing configuration files. Consider rotating the Gateway Key after patching to invalidate any potentially compromised keys. Additionally, conduct regular audits of remote management tools and credentials to ensure compliance with security policies. Educate users and administrators about the risks of local file exposure and enforce least privilege principles to reduce attack vectors.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2025-34180: CWE-257 Storing Passwords in a Recoverable Format in NetSupport Software Manager
Description
NetSupport Manager < 14.12.0001 relies on a shared Gateway Key for authentication between Manager/Control, Client, and Connectivity Server components. The key is stored using a reversible encoding scheme. An attacker who obtains access to a deployed client configuration file can decode the stored value to recover the plaintext Gateway Key. Possession of the Gateway Key allows unauthorized access to NetSupport Manager connectivity services and enables remote control of systems managed through the same key.
AI-Powered Analysis
Technical Analysis
CVE-2025-34180 affects NetSupport Manager versions earlier than 14.12.0001 and involves improper storage of the shared Gateway Key used for authentication between Manager/Control, Client, and Connectivity Server components. Instead of securely hashing or encrypting the key, the software uses a reversible encoding scheme, effectively storing the key in a recoverable format. An attacker who gains access to a deployed client configuration file can decode the stored Gateway Key to obtain its plaintext value. With possession of this key, the attacker can authenticate to NetSupport Manager connectivity services, bypassing normal authentication controls. This enables unauthorized remote control over systems managed by the compromised key, potentially allowing lateral movement, data exfiltration, or disruption of managed endpoints. The vulnerability requires local access to configuration files, which may be obtained through other means such as phishing, malware, or insider threats. No user interaction or elevated privileges beyond local read access are necessary, increasing the risk in environments where endpoint security is weak. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H) indicates a local attack vector with low complexity, no attack prerequisites, and high impact on confidentiality and integrity. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to organizations relying on NetSupport Manager for remote administration, especially in sectors where remote control of endpoints is critical.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized remote access and control of critical systems, resulting in potential data breaches, operational disruption, and loss of trust. Sectors such as finance, healthcare, government, and critical infrastructure that use NetSupport Manager for remote support and management are particularly at risk. The ability to recover the Gateway Key compromises the confidentiality and integrity of the authentication mechanism, allowing attackers to impersonate legitimate management clients. This could facilitate lateral movement within networks, enabling attackers to escalate privileges or exfiltrate sensitive data. Additionally, compromised systems could be manipulated to disrupt services or deploy further malware. The local access requirement somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient endpoint protection or insider threats. The high CVSS score reflects the potential for significant impact if exploited. European organizations must consider the risk of supply chain attacks or insider misuse that could leverage this vulnerability.
Mitigation Recommendations
Organizations should immediately upgrade NetSupport Manager to version 14.12.0001 or later, where this vulnerability is addressed by eliminating reversible encoding of the Gateway Key. Until patching is possible, restrict access to client configuration files by enforcing strict file system permissions and using endpoint protection solutions to detect unauthorized access attempts. Implement network segmentation to limit the exposure of NetSupport Manager connectivity services. Monitor logs for unusual authentication attempts or remote control sessions. Employ strong endpoint security controls to prevent malware or insider threats from accessing configuration files. Consider rotating the Gateway Key after patching to invalidate any potentially compromised keys. Additionally, conduct regular audits of remote management tools and credentials to ensure compliance with security policies. Educate users and administrators about the risks of local file exposure and enforce least privilege principles to reduce attack vectors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6940227fd9bcdf3f3de2752f
Added to database: 12/15/2025, 3:00:15 PM
Last enriched: 12/22/2025, 3:52:15 PM
Last updated: 2/7/2026, 9:02:40 PM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.