CVE-2025-41012: CWE-862 Missing Authorization in TCMAN GIM
Unauthorized access vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system by using the 'pda:userId' and 'pda:newPassword' parameters with 'soapaction UnlockUser’ in '/WS/PDAWebService.asmx'.
AI Analysis
Technical Summary
CVE-2025-41012 is a vulnerability identified in the TCMAN GIM product, version 11 (build 20250304), involving a missing authorization check (CWE-862) in the web service interface. Specifically, the vulnerability exists in the '/WS/PDAWebService.asmx' endpoint, where the 'soapaction UnlockUser' operation accepts parameters 'pda:userId' and 'pda:newPassword'. Due to improper authorization enforcement, an unauthenticated attacker can send crafted SOAP requests to this endpoint to determine if a specific user exists on the system. This user enumeration capability can be leveraged for further targeted attacks such as credential stuffing, phishing, or brute force attempts. The vulnerability does not require any authentication or user interaction, and the attack vector is network accessible (AV:N), making exploitation straightforward. The CVSS 4.0 vector indicates no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), while integrity and availability remain unaffected. Although no public exploits have been reported yet, the high CVSS score (8.7) reflects the severity of the information disclosure risk. The vulnerability was reserved in April 2025 and published in December 2025 by INCIBE, highlighting its recent discovery. No patches are currently linked, suggesting organizations must implement interim mitigations until official fixes are released.
Potential Impact
The primary impact of CVE-2025-41012 is the unauthorized disclosure of user existence information, which compromises confidentiality. For European organizations, this can facilitate targeted cyberattacks such as credential stuffing, social engineering, and spear-phishing campaigns by confirming valid user accounts. In sectors like finance, healthcare, and government, where TCMAN GIM might be used for identity or access management, this vulnerability could expose sensitive user data indirectly by enabling attackers to focus on legitimate accounts. The lack of authentication and ease of exploitation increase the risk of widespread scanning and enumeration attacks. Although the vulnerability does not directly affect system integrity or availability, the information gained can be a stepping stone for more damaging attacks. Organizations with large user bases or critical infrastructure relying on TCMAN GIM are particularly vulnerable to reputational damage and potential regulatory penalties under GDPR if user data confidentiality is compromised.
Mitigation Recommendations
1. Immediately restrict access to the '/WS/PDAWebService.asmx' endpoint, especially the 'UnlockUser' SOAP action, by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests containing 'pda:userId' and 'pda:newPassword' parameters targeting the UnlockUser action. 3. Monitor logs for unusual patterns of user enumeration attempts, including repeated queries for different user IDs from the same source. 4. Enforce strong authentication and authorization checks on all web service endpoints, ensuring that only authorized users can invoke sensitive operations. 5. Coordinate with TCMAN vendor for timely patches or updates addressing this vulnerability and plan for rapid deployment once available. 6. Educate security teams to recognize and respond to potential reconnaissance activities stemming from this vulnerability. 7. Consider implementing rate limiting on the affected endpoint to reduce the feasibility of automated enumeration attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-41012: CWE-862 Missing Authorization in TCMAN GIM
Description
Unauthorized access vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system by using the 'pda:userId' and 'pda:newPassword' parameters with 'soapaction UnlockUser’ in '/WS/PDAWebService.asmx'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41012 is a vulnerability identified in the TCMAN GIM product, version 11 (build 20250304), involving a missing authorization check (CWE-862) in the web service interface. Specifically, the vulnerability exists in the '/WS/PDAWebService.asmx' endpoint, where the 'soapaction UnlockUser' operation accepts parameters 'pda:userId' and 'pda:newPassword'. Due to improper authorization enforcement, an unauthenticated attacker can send crafted SOAP requests to this endpoint to determine if a specific user exists on the system. This user enumeration capability can be leveraged for further targeted attacks such as credential stuffing, phishing, or brute force attempts. The vulnerability does not require any authentication or user interaction, and the attack vector is network accessible (AV:N), making exploitation straightforward. The CVSS 4.0 vector indicates no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), while integrity and availability remain unaffected. Although no public exploits have been reported yet, the high CVSS score (8.7) reflects the severity of the information disclosure risk. The vulnerability was reserved in April 2025 and published in December 2025 by INCIBE, highlighting its recent discovery. No patches are currently linked, suggesting organizations must implement interim mitigations until official fixes are released.
Potential Impact
The primary impact of CVE-2025-41012 is the unauthorized disclosure of user existence information, which compromises confidentiality. For European organizations, this can facilitate targeted cyberattacks such as credential stuffing, social engineering, and spear-phishing campaigns by confirming valid user accounts. In sectors like finance, healthcare, and government, where TCMAN GIM might be used for identity or access management, this vulnerability could expose sensitive user data indirectly by enabling attackers to focus on legitimate accounts. The lack of authentication and ease of exploitation increase the risk of widespread scanning and enumeration attacks. Although the vulnerability does not directly affect system integrity or availability, the information gained can be a stepping stone for more damaging attacks. Organizations with large user bases or critical infrastructure relying on TCMAN GIM are particularly vulnerable to reputational damage and potential regulatory penalties under GDPR if user data confidentiality is compromised.
Mitigation Recommendations
1. Immediately restrict access to the '/WS/PDAWebService.asmx' endpoint, especially the 'UnlockUser' SOAP action, by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests containing 'pda:userId' and 'pda:newPassword' parameters targeting the UnlockUser action. 3. Monitor logs for unusual patterns of user enumeration attempts, including repeated queries for different user IDs from the same source. 4. Enforce strong authentication and authorization checks on all web service endpoints, ensuring that only authorized users can invoke sensitive operations. 5. Coordinate with TCMAN vendor for timely patches or updates addressing this vulnerability and plan for rapid deployment once available. 6. Educate security teams to recognize and respond to potential reconnaissance activities stemming from this vulnerability. 7. Consider implementing rate limiting on the affected endpoint to reduce the feasibility of automated enumeration attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:08:43.217Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692ee9715ae7112264cd39c7
Added to database: 12/2/2025, 1:28:17 PM
Last enriched: 12/2/2025, 1:43:18 PM
Last updated: 1/16/2026, 10:11:45 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-20960: CWE-285: Improper Authorization in Microsoft Microsoft Power Apps
HighCVE-2025-56451: n/a
MediumCVE-2026-23800: CWE-266 Incorrect Privilege Assignment in Modular DS
CriticalCVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.