CVE-2025-4430: CWE-862 Missing Authorization in Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy EZD RP
Unauthorized access to "/api/Token/gettoken" endpoint in EZD RP allows file manipulation.This issue affects EZD RP in versions before 20.19 (published on 22nd August 2024).
AI Analysis
Technical Summary
CVE-2025-4430 is a high-severity vulnerability identified in the EZD RP product developed by Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue allows unauthorized access to the "/api/Token/gettoken" endpoint in versions of EZD RP prior to 20.19 (released on August 22, 2024). This endpoint is intended to handle token generation or retrieval, but due to missing authorization controls, attackers can access it without proper credentials or permissions. Exploiting this flaw enables unauthorized file manipulation within the system, which could lead to unauthorized data modification, deletion, or insertion. The vulnerability has a CVSS 4.0 base score of 8.6, indicating a high severity level. The vector details show that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). However, it requires low privileges (PR:L), which suggests that some minimal access or user context might be needed, but no elevated privileges. The impact on confidentiality and integrity is high (VC:H, VI:H), while availability and other factors are not impacted. No known exploits are currently reported in the wild, and no patches are linked yet, though the fixed version is indicated as 20.19. The vulnerability was assigned and published by CERT-PL, indicating a credible source. Overall, this vulnerability represents a critical security gap in the authorization mechanism of a sensitive API endpoint, potentially allowing attackers to manipulate files and compromise system integrity remotely without user interaction.
Potential Impact
For European organizations, especially those using EZD RP for document and workflow management, this vulnerability poses a significant risk. Unauthorized file manipulation can lead to data breaches, loss of data integrity, and disruption of business processes. Since EZD RP is developed by a Polish research institute and likely used in academic, governmental, or research institutions in Poland and possibly neighboring countries, the impact is particularly critical in these sectors. Attackers exploiting this vulnerability could alter official documents, inject malicious files, or delete critical records, undermining trust and compliance with data protection regulations such as GDPR. The lack of authentication and user interaction requirements means that exploitation can be automated and performed at scale, increasing the risk of widespread compromise. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the network, including lateral movement or privilege escalation. Given the strategic importance of research and academic institutions in Europe, this vulnerability could have cascading effects on intellectual property protection and national research infrastructure security.
Mitigation Recommendations
1. Immediate upgrade to EZD RP version 20.19 or later once available, as this version addresses the missing authorization issue. 2. Until patching is possible, restrict network access to the "/api/Token/gettoken" endpoint by implementing firewall rules or API gateway policies that limit access to trusted IP addresses or internal networks only. 3. Employ Web Application Firewalls (WAF) with custom rules to detect and block unauthorized attempts to access this endpoint. 4. Conduct thorough access reviews and monitor logs for unusual or unauthorized access patterns targeting the token endpoint. 5. Implement strict network segmentation to isolate EZD RP servers from less trusted network zones. 6. Use intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts. 7. Educate system administrators and users about the vulnerability and encourage vigilance for suspicious activity. 8. Prepare incident response plans specifically addressing potential exploitation of this vulnerability, including forensic readiness to analyze file manipulation events. 9. Engage with the vendor or CERT-PL for timely updates and patches. 10. Consider temporary disabling or limiting the functionality of the vulnerable API endpoint if business operations allow.
Affected Countries
Poland, Germany, Czech Republic, Slovakia, Austria
CVE-2025-4430: CWE-862 Missing Authorization in Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy EZD RP
Description
Unauthorized access to "/api/Token/gettoken" endpoint in EZD RP allows file manipulation.This issue affects EZD RP in versions before 20.19 (published on 22nd August 2024).
AI-Powered Analysis
Technical Analysis
CVE-2025-4430 is a high-severity vulnerability identified in the EZD RP product developed by Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue allows unauthorized access to the "/api/Token/gettoken" endpoint in versions of EZD RP prior to 20.19 (released on August 22, 2024). This endpoint is intended to handle token generation or retrieval, but due to missing authorization controls, attackers can access it without proper credentials or permissions. Exploiting this flaw enables unauthorized file manipulation within the system, which could lead to unauthorized data modification, deletion, or insertion. The vulnerability has a CVSS 4.0 base score of 8.6, indicating a high severity level. The vector details show that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). However, it requires low privileges (PR:L), which suggests that some minimal access or user context might be needed, but no elevated privileges. The impact on confidentiality and integrity is high (VC:H, VI:H), while availability and other factors are not impacted. No known exploits are currently reported in the wild, and no patches are linked yet, though the fixed version is indicated as 20.19. The vulnerability was assigned and published by CERT-PL, indicating a credible source. Overall, this vulnerability represents a critical security gap in the authorization mechanism of a sensitive API endpoint, potentially allowing attackers to manipulate files and compromise system integrity remotely without user interaction.
Potential Impact
For European organizations, especially those using EZD RP for document and workflow management, this vulnerability poses a significant risk. Unauthorized file manipulation can lead to data breaches, loss of data integrity, and disruption of business processes. Since EZD RP is developed by a Polish research institute and likely used in academic, governmental, or research institutions in Poland and possibly neighboring countries, the impact is particularly critical in these sectors. Attackers exploiting this vulnerability could alter official documents, inject malicious files, or delete critical records, undermining trust and compliance with data protection regulations such as GDPR. The lack of authentication and user interaction requirements means that exploitation can be automated and performed at scale, increasing the risk of widespread compromise. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the network, including lateral movement or privilege escalation. Given the strategic importance of research and academic institutions in Europe, this vulnerability could have cascading effects on intellectual property protection and national research infrastructure security.
Mitigation Recommendations
1. Immediate upgrade to EZD RP version 20.19 or later once available, as this version addresses the missing authorization issue. 2. Until patching is possible, restrict network access to the "/api/Token/gettoken" endpoint by implementing firewall rules or API gateway policies that limit access to trusted IP addresses or internal networks only. 3. Employ Web Application Firewalls (WAF) with custom rules to detect and block unauthorized attempts to access this endpoint. 4. Conduct thorough access reviews and monitor logs for unusual or unauthorized access patterns targeting the token endpoint. 5. Implement strict network segmentation to isolate EZD RP servers from less trusted network zones. 6. Use intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts. 7. Educate system administrators and users about the vulnerability and encourage vigilance for suspicious activity. 8. Prepare incident response plans specifically addressing potential exploitation of this vulnerability, including forensic readiness to analyze file manipulation events. 9. Engage with the vendor or CERT-PL for timely updates and patches. 10. Consider temporary disabling or limiting the functionality of the vulnerable API endpoint if business operations allow.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-05-08T12:34:39.711Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecaf2
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 4:28:35 PM
Last updated: 7/31/2025, 1:08:03 PM
Views: 8
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.