Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41012: CWE-862 Missing Authorization in TCMAN GIM

0
High
VulnerabilityCVE-2025-41012cvecve-2025-41012cwe-862
Published: Tue Dec 02 2025 (12/02/2025, 13:12:43 UTC)
Source: CVE Database V5
Vendor/Project: TCMAN
Product: GIM

Description

Unauthorized access vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system by using the 'pda:userId' and 'pda:newPassword' parameters with 'soapaction UnlockUser’ in '/WS/PDAWebService.asmx'.

AI-Powered Analysis

AILast updated: 12/02/2025, 13:43:18 UTC

Technical Analysis

CVE-2025-41012 is a vulnerability identified in the TCMAN GIM product, version 11 (build 20250304), involving a missing authorization check (CWE-862) in the web service interface. Specifically, the vulnerability exists in the '/WS/PDAWebService.asmx' endpoint, where the 'soapaction UnlockUser' operation accepts parameters 'pda:userId' and 'pda:newPassword'. Due to improper authorization enforcement, an unauthenticated attacker can send crafted SOAP requests to this endpoint to determine if a specific user exists on the system. This user enumeration capability can be leveraged for further targeted attacks such as credential stuffing, phishing, or brute force attempts. The vulnerability does not require any authentication or user interaction, and the attack vector is network accessible (AV:N), making exploitation straightforward. The CVSS 4.0 vector indicates no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), while integrity and availability remain unaffected. Although no public exploits have been reported yet, the high CVSS score (8.7) reflects the severity of the information disclosure risk. The vulnerability was reserved in April 2025 and published in December 2025 by INCIBE, highlighting its recent discovery. No patches are currently linked, suggesting organizations must implement interim mitigations until official fixes are released.

Potential Impact

The primary impact of CVE-2025-41012 is the unauthorized disclosure of user existence information, which compromises confidentiality. For European organizations, this can facilitate targeted cyberattacks such as credential stuffing, social engineering, and spear-phishing campaigns by confirming valid user accounts. In sectors like finance, healthcare, and government, where TCMAN GIM might be used for identity or access management, this vulnerability could expose sensitive user data indirectly by enabling attackers to focus on legitimate accounts. The lack of authentication and ease of exploitation increase the risk of widespread scanning and enumeration attacks. Although the vulnerability does not directly affect system integrity or availability, the information gained can be a stepping stone for more damaging attacks. Organizations with large user bases or critical infrastructure relying on TCMAN GIM are particularly vulnerable to reputational damage and potential regulatory penalties under GDPR if user data confidentiality is compromised.

Mitigation Recommendations

1. Immediately restrict access to the '/WS/PDAWebService.asmx' endpoint, especially the 'UnlockUser' SOAP action, by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests containing 'pda:userId' and 'pda:newPassword' parameters targeting the UnlockUser action. 3. Monitor logs for unusual patterns of user enumeration attempts, including repeated queries for different user IDs from the same source. 4. Enforce strong authentication and authorization checks on all web service endpoints, ensuring that only authorized users can invoke sensitive operations. 5. Coordinate with TCMAN vendor for timely patches or updates addressing this vulnerability and plan for rapid deployment once available. 6. Educate security teams to recognize and respond to potential reconnaissance activities stemming from this vulnerability. 7. Consider implementing rate limiting on the affected endpoint to reduce the feasibility of automated enumeration attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:08:43.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ee9715ae7112264cd39c7

Added to database: 12/2/2025, 1:28:17 PM

Last enriched: 12/2/2025, 1:43:18 PM

Last updated: 1/16/2026, 10:11:45 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats