Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41015: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TCMAN GIM

0
Medium
VulnerabilityCVE-2025-41015cvecve-2025-41015cwe-200
Published: Tue Dec 02 2025 (12/02/2025, 13:18:25 UTC)
Source: CVE Database V5
Vendor/Project: TCMAN
Product: GIM

Description

CVE-2025-41015 is a user enumeration vulnerability in TCMAN GIM v11 (version 20250304) that allows unauthenticated attackers to verify the existence of users via the 'pda:username' parameter in the 'soapaction GetUserQuestionAndAnswer' endpoint. This exposure of sensitive information can facilitate further targeted attacks such as phishing or brute force. The vulnerability has a CVSS 4. 0 base score of 6. 9 (medium severity), indicating moderate risk due to ease of exploitation without authentication and no user interaction required. Although no known exploits are currently in the wild, European organizations using TCMAN GIM should be aware of this risk. Mitigation involves restricting access to the vulnerable web service, implementing rate limiting, and monitoring for suspicious requests. Countries with significant deployments of TCMAN products or critical infrastructure using this system are at higher risk. Prompt patching or vendor guidance should be sought once available.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:39:43 UTC

Technical Analysis

CVE-2025-41015 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting TCMAN GIM version 11 (20250304). The flaw resides in the SOAP web service endpoint '/WS/PDAWebService.asmx', specifically in the 'GetUserQuestionAndAnswer' action, which accepts a 'pda:username' parameter. An unauthenticated attacker can send crafted requests to this endpoint to determine if a username exists in the system, effectively enabling user enumeration. This information disclosure can be leveraged to facilitate subsequent attacks such as credential stuffing, phishing, or social engineering by confirming valid user accounts. The vulnerability does not require any privileges or user interaction, making it easier to exploit remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no authentication, and low impact on confidentiality (limited to user existence information). No patches or known exploits have been reported at the time of publication, but the exposure of user enumeration data represents a significant security concern, especially for organizations relying on TCMAN GIM for identity or access management. The vulnerability was assigned and published by INCIBE, indicating recognized severity and the need for mitigation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the exposure of valid usernames to unauthenticated attackers. This can undermine user privacy and facilitate targeted attacks such as phishing campaigns, brute force password attempts, or social engineering. Organizations using TCMAN GIM in sectors like government, finance, healthcare, or critical infrastructure may face increased risk of account compromise or unauthorized access attempts. While the vulnerability does not directly allow system compromise or data modification, the information gained can be a stepping stone for more severe attacks. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by threat actors. Additionally, organizations may face regulatory and compliance risks under GDPR if user information is exposed without adequate protection. The lack of current exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such enumeration flaws rapidly once disclosed.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict access to the '/WS/PDAWebService.asmx' endpoint by IP whitelisting or network segmentation to limit exposure to trusted networks only. 2) Implement rate limiting and anomaly detection on the SOAP service to detect and block repeated username enumeration attempts. 3) Monitor logs for suspicious requests targeting the 'GetUserQuestionAndAnswer' action and the 'pda:username' parameter. 4) Coordinate with TCMAN vendors for patches or updates addressing this vulnerability and apply them promptly once available. 5) Consider deploying Web Application Firewalls (WAFs) with custom rules to block enumeration patterns. 6) Educate users and administrators about phishing risks that may arise from exposed usernames. 7) Review and harden authentication and password policies to mitigate risks from potential brute force attacks facilitated by enumeration. 8) Conduct regular security assessments and penetration tests focusing on identity management systems to detect similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:25.289Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692eecf35ae7112264d1dd3d

Added to database: 12/2/2025, 1:43:15 PM

Last enriched: 12/9/2025, 2:39:43 PM

Last updated: 1/16/2026, 10:16:37 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats