CVE-2025-4552: Unverified Password Change in ContiNew Admin
A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-4552 is a medium-severity vulnerability affecting ContiNew Admin versions 3.0 through 3.6.0. The vulnerability resides in an unverified password change functionality exposed via the endpoint /dev-api/system/user/1/password. This endpoint allows remote attackers to change the password of a user account without proper verification or authentication. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no privileges required, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is limited to the affected user account, with a low impact on confidentiality and integrity but potentially medium impact on availability if the account is critical for system administration. The vulnerability was publicly disclosed on May 11, 2025, and although the vendor was contacted, no response or patch has been issued to date. No known exploits are currently observed in the wild, but the public disclosure increases the risk of exploitation. The lack of authentication or verification in the password change process represents a significant security flaw that could allow attackers to gain unauthorized access or disrupt administrative control over the ContiNew Admin system.
Potential Impact
For European organizations using ContiNew Admin, this vulnerability poses a tangible risk to system security and operational continuity. Unauthorized password changes could lead to unauthorized access to administrative accounts, enabling attackers to manipulate system configurations, access sensitive data, or disrupt services. This is particularly critical for organizations relying on ContiNew Admin for managing IT infrastructure or sensitive environments. The medium severity suggests that while the vulnerability may not lead to full system compromise immediately, it can serve as a foothold for further attacks or lateral movement within networks. Given the lack of vendor response and patches, European organizations face increased exposure, especially those in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure. The exploitability without user interaction and remotely accessible nature of the vulnerability further amplifies the threat, making timely mitigation essential to prevent potential breaches or service disruptions.
Mitigation Recommendations
European organizations should implement immediate compensating controls to mitigate this vulnerability in the absence of an official patch. These include restricting network access to the ContiNew Admin interface by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Enforce multi-factor authentication (MFA) on all administrative accounts to reduce the risk of unauthorized access even if passwords are changed. Monitor logs and audit trails for any unusual password change activities or unauthorized access attempts. If possible, disable or restrict access to the vulnerable API endpoint (/dev-api/system/user/1/password) until a patch is available. Conduct regular vulnerability scans and penetration tests focused on ContiNew Admin to detect exploitation attempts. Additionally, organizations should engage with the vendor or community for updates and consider alternative administrative tools if the vendor remains unresponsive. Finally, prepare incident response plans specifically addressing unauthorized access scenarios related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-4552: Unverified Password Change in ContiNew Admin
Description
A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-4552 is a medium-severity vulnerability affecting ContiNew Admin versions 3.0 through 3.6.0. The vulnerability resides in an unverified password change functionality exposed via the endpoint /dev-api/system/user/1/password. This endpoint allows remote attackers to change the password of a user account without proper verification or authentication. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no privileges required, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is limited to the affected user account, with a low impact on confidentiality and integrity but potentially medium impact on availability if the account is critical for system administration. The vulnerability was publicly disclosed on May 11, 2025, and although the vendor was contacted, no response or patch has been issued to date. No known exploits are currently observed in the wild, but the public disclosure increases the risk of exploitation. The lack of authentication or verification in the password change process represents a significant security flaw that could allow attackers to gain unauthorized access or disrupt administrative control over the ContiNew Admin system.
Potential Impact
For European organizations using ContiNew Admin, this vulnerability poses a tangible risk to system security and operational continuity. Unauthorized password changes could lead to unauthorized access to administrative accounts, enabling attackers to manipulate system configurations, access sensitive data, or disrupt services. This is particularly critical for organizations relying on ContiNew Admin for managing IT infrastructure or sensitive environments. The medium severity suggests that while the vulnerability may not lead to full system compromise immediately, it can serve as a foothold for further attacks or lateral movement within networks. Given the lack of vendor response and patches, European organizations face increased exposure, especially those in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure. The exploitability without user interaction and remotely accessible nature of the vulnerability further amplifies the threat, making timely mitigation essential to prevent potential breaches or service disruptions.
Mitigation Recommendations
European organizations should implement immediate compensating controls to mitigate this vulnerability in the absence of an official patch. These include restricting network access to the ContiNew Admin interface by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Enforce multi-factor authentication (MFA) on all administrative accounts to reduce the risk of unauthorized access even if passwords are changed. Monitor logs and audit trails for any unusual password change activities or unauthorized access attempts. If possible, disable or restrict access to the vulnerable API endpoint (/dev-api/system/user/1/password) until a patch is available. Conduct regular vulnerability scans and penetration tests focused on ContiNew Admin to detect exploitation attempts. Additionally, organizations should engage with the vendor or community for updates and consider alternative administrative tools if the vendor remains unresponsive. Finally, prepare incident response plans specifically addressing unauthorized access scenarios related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-10T15:45:14.197Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6e40
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:17:44 AM
Last updated: 8/17/2025, 1:34:45 PM
Views: 20
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.