Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41090: CWE-306 Missing Authentication for Critical Function in CCN-CERT microCLAUDIA

0
High
VulnerabilityCVE-2025-41090cvecve-2025-41090cwe-306
Published: Tue Oct 28 2025 (10/28/2025, 09:17:08 UTC)
Source: CVE Database V5
Vendor/Project: CCN-CERT
Product: microCLAUDIA

Description

microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability. This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually. This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.

AI-Powered Analysis

AILast updated: 10/28/2025, 09:40:21 UTC

Technical Analysis

CVE-2025-41090 is an improper access control vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting microCLAUDIA versions 3.2.0 and earlier. The flaw arises because the application fails to enforce proper authentication checks on API endpoints that manage critical functions across organizational tenants. An attacker with legitimate low-level credentials can exploit this by sending direct API requests containing organization identifiers, which can be obtained from compromised endpoints or deduced manually. This allows unauthorized cross-tenant access, breaking tenant isolation and enabling the attacker to list and manage remote assets belonging to other organizations, uninstall security agents, and delete vaccine configurations. These actions compromise the confidentiality, integrity, and availability of affected systems. The vulnerability has a CVSS 4.0 score of 7.6, reflecting network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the critical nature of the affected functions and the potential for lateral movement within multi-tenant environments.

Potential Impact

For European organizations, this vulnerability could lead to severe operational disruptions and data breaches. The ability for an attacker to cross organizational boundaries undermines the fundamental security model of multi-tenant cloud environments, potentially exposing sensitive asset inventories and security configurations. Attackers could uninstall security agents, disabling endpoint protection and increasing exposure to further compromise. Deletion of vaccine configurations could leave systems vulnerable to malware and other threats. The breach of confidentiality and integrity could result in regulatory non-compliance, especially under GDPR, leading to legal and financial repercussions. Organizations relying on microCLAUDIA for asset management and endpoint security are at risk of lateral movement attacks and loss of control over their security posture.

Mitigation Recommendations

Organizations should immediately verify the version of microCLAUDIA in use and upgrade to a patched version once available. In the absence of a patch, restrict API access through network segmentation and strict firewall rules to limit exposure of management interfaces. Implement strong authentication and authorization controls, including multi-factor authentication and role-based access control, to minimize the risk of credential compromise and misuse. Monitor API logs for unusual access patterns, especially cross-tenant requests. Conduct thorough audits of organization identifiers and rotate or obscure them if possible to prevent easy enumeration. Engage with CCN-CERT or the vendor for guidance and apply any recommended configuration changes. Additionally, enhance endpoint detection and response capabilities to identify and respond to agent uninstallation or configuration tampering attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:36.724Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69008c1568b9eefb8da85d52

Added to database: 10/28/2025, 9:25:41 AM

Last enriched: 10/28/2025, 9:40:21 AM

Last updated: 10/28/2025, 2:45:12 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats