Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41257: CWE-20 Improper Input Validation in Suprema BioStar 2

0
Medium
VulnerabilityCVE-2025-41257cvecve-2025-41257cwe-20
Published: Wed Mar 04 2026 (03/04/2026, 22:43:53 UTC)
Source: CVE Database V5
Vendor/Project: Suprema
Product: BioStar 2

Description

Suprema’s BioStar 2 in version 2.9.11.6 allows users to set new password without providing the current one. Exploiting this flaw combined with other vulnerabilities can lead to unauthorized account access and potential system compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 19:43:04 UTC

Technical Analysis

The vulnerability identified as CVE-2025-41257 affects Suprema's BioStar 2 access control software, specifically version 2.9.11.6. It stems from improper input validation (CWE-20) that permits an attacker to reset a user's password without needing to provide the current password. This flaw undermines the authentication mechanism, allowing unauthorized users to potentially take over accounts. The CVSS 3.1 base score is 4.8 (medium), with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality and integrity but not availability. Although no exploits are known in the wild, the vulnerability can be leveraged in conjunction with other weaknesses to escalate privileges or gain broader system access. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. The vulnerability highlights a critical flaw in password reset logic that could be abused remotely, posing a risk to organizations relying on BioStar 2 for physical access control and identity management.

Potential Impact

If exploited, this vulnerability could allow attackers to reset passwords of legitimate user accounts without authorization, leading to unauthorized access to the BioStar 2 system. This unauthorized access can compromise the confidentiality and integrity of sensitive access control data, including user credentials and access logs. Attackers might manipulate access permissions or disable security controls, potentially enabling physical security breaches. The flaw could be combined with other vulnerabilities to escalate privileges or pivot to other internal systems, increasing the scope of compromise. Organizations relying on BioStar 2 for critical infrastructure or high-security environments face increased risk of insider threats or external attackers bypassing physical security measures. The medium CVSS score reflects moderate impact and exploitation difficulty, but the potential consequences for physical security and data integrity are significant.

Mitigation Recommendations

Organizations should immediately assess their use of Suprema BioStar 2 version 2.9.11.6 and plan to upgrade to a patched version once available. Until a patch is released, implement strict network segmentation and firewall rules to restrict access to the BioStar 2 management interfaces to trusted administrators only. Enable multi-factor authentication (MFA) for all administrative accounts to reduce the risk of unauthorized access. Monitor system logs for unusual password reset activities or access patterns indicative of exploitation attempts. Conduct regular audits of user accounts and permissions to detect unauthorized changes. If possible, disable remote password reset functionality or require additional verification steps to strengthen authentication. Engage with Suprema support for guidance and early access to patches or workarounds. Finally, incorporate this vulnerability into incident response plans to ensure rapid detection and containment if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
sba-research
Date Reserved
2025-04-16T09:37:50.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a8cbd6d1a09e29cb893ba7

Added to database: 3/5/2026, 12:18:30 AM

Last enriched: 3/12/2026, 7:43:04 PM

Last updated: 4/19/2026, 6:20:14 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses