Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41014: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TCMAN GIM

0
Medium
VulnerabilityCVE-2025-41014cvecve-2025-41014cwe-200
Published: Tue Dec 02 2025 (12/02/2025, 13:18:13 UTC)
Source: CVE Database V5
Vendor/Project: TCMAN
Product: GIM

Description

CVE-2025-41014 is a medium-severity user enumeration vulnerability in TCMAN GIM v11 (20250304). It allows unauthenticated attackers to verify the existence of users via the 'pda:username' parameter in the SOAP action 'GetLastDatePasswordChange' at the endpoint '/WS/PDAWebService. asmx'. This exposure of sensitive information (CWE-200) can facilitate further targeted attacks such as phishing or brute force. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9. There are no known exploits in the wild and no patches currently available. European organizations using TCMAN GIM should be aware of the risk of user enumeration leading to compromised confidentiality and should implement mitigations promptly. Countries with higher adoption of TCMAN products and critical infrastructure using this software are at greater risk.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:39:22 UTC

Technical Analysis

CVE-2025-41014 is a vulnerability identified in TCMAN GIM version 11 (build 20250304) that allows an unauthenticated attacker to perform user enumeration by exploiting the 'pda:username' parameter in the SOAP web service method 'GetLastDatePasswordChange' located at '/WS/PDAWebService.asmx'. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. Specifically, the attacker can determine whether a given username exists in the system without requiring any authentication or user interaction. This is achieved by sending crafted SOAP requests and analyzing the responses to infer valid usernames. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (exposure of user existence information). Although no known exploits are currently reported in the wild and no official patches have been released, the vulnerability poses a risk as it can facilitate further attacks such as targeted phishing, password guessing, or brute force attacks by providing valid usernames. The vulnerability affects all versions of TCMAN GIM 11 as indicated, and the lack of authentication on the vulnerable endpoint increases the attack surface. The technical details were assigned by INCIBE and published in December 2025. The vulnerability does not impact integrity or availability directly but compromises confidentiality by leaking user existence information.

Potential Impact

For European organizations using TCMAN GIM, this vulnerability primarily threatens the confidentiality of user information by allowing attackers to confirm valid usernames without authentication. This can significantly aid attackers in mounting targeted phishing campaigns, credential stuffing, or brute force attacks, potentially leading to unauthorized access if combined with weak password policies or other vulnerabilities. Organizations in sectors with high-value targets, such as finance, government, or critical infrastructure, may face increased risk due to the strategic value of user enumeration data. The exposure can also undermine trust in the affected systems and lead to compliance issues under data protection regulations like GDPR, which mandates protection of personal data. While the vulnerability itself does not allow direct system compromise, it lowers the barrier for attackers to escalate attacks, increasing overall organizational risk. The lack of patches and known exploits means organizations must proactively mitigate the risk to prevent exploitation.

Mitigation Recommendations

1. Restrict access to the vulnerable SOAP endpoint '/WS/PDAWebService.asmx' by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure to trusted users only. 2. Implement rate limiting and anomaly detection on the web service to detect and block repeated requests that indicate user enumeration attempts. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests targeting the 'GetLastDatePasswordChange' action with the 'pda:username' parameter. 4. Monitor logs for unusual access patterns or repeated failed attempts to enumerate users and respond promptly to incidents. 5. Enforce strong password policies and multi-factor authentication (MFA) to reduce the risk of credential-based attacks that could follow user enumeration. 6. Engage with TCMAN vendor support to obtain patches or updates as they become available and plan for timely deployment. 7. Conduct user awareness training to recognize phishing attempts that may leverage enumerated usernames. 8. Consider temporarily disabling or restricting the vulnerable service if it is not essential to business operations until a patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:08:43.218Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692eecf35ae7112264d1dd3a

Added to database: 12/2/2025, 1:43:15 PM

Last enriched: 12/9/2025, 2:39:22 PM

Last updated: 1/16/2026, 10:15:41 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats