CVE-2025-41014: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TCMAN GIM
CVE-2025-41014 is a medium-severity user enumeration vulnerability in TCMAN GIM v11 (20250304). It allows unauthenticated attackers to verify the existence of users via the 'pda:username' parameter in the SOAP action 'GetLastDatePasswordChange' at the endpoint '/WS/PDAWebService. asmx'. This exposure of sensitive information (CWE-200) can facilitate further targeted attacks such as phishing or brute force. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9. There are no known exploits in the wild and no patches currently available. European organizations using TCMAN GIM should be aware of the risk of user enumeration leading to compromised confidentiality and should implement mitigations promptly. Countries with higher adoption of TCMAN products and critical infrastructure using this software are at greater risk.
AI Analysis
Technical Summary
CVE-2025-41014 is a vulnerability identified in TCMAN GIM version 11 (build 20250304) that allows an unauthenticated attacker to perform user enumeration by exploiting the 'pda:username' parameter in the SOAP web service method 'GetLastDatePasswordChange' located at '/WS/PDAWebService.asmx'. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. Specifically, the attacker can determine whether a given username exists in the system without requiring any authentication or user interaction. This is achieved by sending crafted SOAP requests and analyzing the responses to infer valid usernames. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (exposure of user existence information). Although no known exploits are currently reported in the wild and no official patches have been released, the vulnerability poses a risk as it can facilitate further attacks such as targeted phishing, password guessing, or brute force attacks by providing valid usernames. The vulnerability affects all versions of TCMAN GIM 11 as indicated, and the lack of authentication on the vulnerable endpoint increases the attack surface. The technical details were assigned by INCIBE and published in December 2025. The vulnerability does not impact integrity or availability directly but compromises confidentiality by leaking user existence information.
Potential Impact
For European organizations using TCMAN GIM, this vulnerability primarily threatens the confidentiality of user information by allowing attackers to confirm valid usernames without authentication. This can significantly aid attackers in mounting targeted phishing campaigns, credential stuffing, or brute force attacks, potentially leading to unauthorized access if combined with weak password policies or other vulnerabilities. Organizations in sectors with high-value targets, such as finance, government, or critical infrastructure, may face increased risk due to the strategic value of user enumeration data. The exposure can also undermine trust in the affected systems and lead to compliance issues under data protection regulations like GDPR, which mandates protection of personal data. While the vulnerability itself does not allow direct system compromise, it lowers the barrier for attackers to escalate attacks, increasing overall organizational risk. The lack of patches and known exploits means organizations must proactively mitigate the risk to prevent exploitation.
Mitigation Recommendations
1. Restrict access to the vulnerable SOAP endpoint '/WS/PDAWebService.asmx' by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure to trusted users only. 2. Implement rate limiting and anomaly detection on the web service to detect and block repeated requests that indicate user enumeration attempts. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests targeting the 'GetLastDatePasswordChange' action with the 'pda:username' parameter. 4. Monitor logs for unusual access patterns or repeated failed attempts to enumerate users and respond promptly to incidents. 5. Enforce strong password policies and multi-factor authentication (MFA) to reduce the risk of credential-based attacks that could follow user enumeration. 6. Engage with TCMAN vendor support to obtain patches or updates as they become available and plan for timely deployment. 7. Conduct user awareness training to recognize phishing attempts that may leverage enumerated usernames. 8. Consider temporarily disabling or restricting the vulnerable service if it is not essential to business operations until a patch is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2025-41014: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TCMAN GIM
Description
CVE-2025-41014 is a medium-severity user enumeration vulnerability in TCMAN GIM v11 (20250304). It allows unauthenticated attackers to verify the existence of users via the 'pda:username' parameter in the SOAP action 'GetLastDatePasswordChange' at the endpoint '/WS/PDAWebService. asmx'. This exposure of sensitive information (CWE-200) can facilitate further targeted attacks such as phishing or brute force. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9. There are no known exploits in the wild and no patches currently available. European organizations using TCMAN GIM should be aware of the risk of user enumeration leading to compromised confidentiality and should implement mitigations promptly. Countries with higher adoption of TCMAN products and critical infrastructure using this software are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-41014 is a vulnerability identified in TCMAN GIM version 11 (build 20250304) that allows an unauthenticated attacker to perform user enumeration by exploiting the 'pda:username' parameter in the SOAP web service method 'GetLastDatePasswordChange' located at '/WS/PDAWebService.asmx'. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. Specifically, the attacker can determine whether a given username exists in the system without requiring any authentication or user interaction. This is achieved by sending crafted SOAP requests and analyzing the responses to infer valid usernames. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (exposure of user existence information). Although no known exploits are currently reported in the wild and no official patches have been released, the vulnerability poses a risk as it can facilitate further attacks such as targeted phishing, password guessing, or brute force attacks by providing valid usernames. The vulnerability affects all versions of TCMAN GIM 11 as indicated, and the lack of authentication on the vulnerable endpoint increases the attack surface. The technical details were assigned by INCIBE and published in December 2025. The vulnerability does not impact integrity or availability directly but compromises confidentiality by leaking user existence information.
Potential Impact
For European organizations using TCMAN GIM, this vulnerability primarily threatens the confidentiality of user information by allowing attackers to confirm valid usernames without authentication. This can significantly aid attackers in mounting targeted phishing campaigns, credential stuffing, or brute force attacks, potentially leading to unauthorized access if combined with weak password policies or other vulnerabilities. Organizations in sectors with high-value targets, such as finance, government, or critical infrastructure, may face increased risk due to the strategic value of user enumeration data. The exposure can also undermine trust in the affected systems and lead to compliance issues under data protection regulations like GDPR, which mandates protection of personal data. While the vulnerability itself does not allow direct system compromise, it lowers the barrier for attackers to escalate attacks, increasing overall organizational risk. The lack of patches and known exploits means organizations must proactively mitigate the risk to prevent exploitation.
Mitigation Recommendations
1. Restrict access to the vulnerable SOAP endpoint '/WS/PDAWebService.asmx' by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure to trusted users only. 2. Implement rate limiting and anomaly detection on the web service to detect and block repeated requests that indicate user enumeration attempts. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SOAP requests targeting the 'GetLastDatePasswordChange' action with the 'pda:username' parameter. 4. Monitor logs for unusual access patterns or repeated failed attempts to enumerate users and respond promptly to incidents. 5. Enforce strong password policies and multi-factor authentication (MFA) to reduce the risk of credential-based attacks that could follow user enumeration. 6. Engage with TCMAN vendor support to obtain patches or updates as they become available and plan for timely deployment. 7. Conduct user awareness training to recognize phishing attempts that may leverage enumerated usernames. 8. Consider temporarily disabling or restricting the vulnerable service if it is not essential to business operations until a patch is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:08:43.218Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692eecf35ae7112264d1dd3a
Added to database: 12/2/2025, 1:43:15 PM
Last enriched: 12/9/2025, 2:39:22 PM
Last updated: 1/16/2026, 10:15:41 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-20960: CWE-285: Improper Authorization in Microsoft Microsoft Power Apps
HighCVE-2025-56451: n/a
MediumCVE-2026-23800: CWE-266 Incorrect Privilege Assignment in Modular DS
CriticalCVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.