Skip to main content

CVE-2025-4552: Unverified Password Change in ContiNew Admin

Medium
VulnerabilityCVE-2025-4552cvecve-2025-4552
Published: Sun May 11 2025 (05/11/2025, 23:31:04 UTC)
Source: CVE
Vendor/Project: n/a
Product: ContiNew Admin

Description

A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/12/2025, 04:17:44 UTC

Technical Analysis

CVE-2025-4552 is a medium-severity vulnerability affecting ContiNew Admin versions 3.0 through 3.6.0. The vulnerability resides in an unverified password change functionality exposed via the endpoint /dev-api/system/user/1/password. This endpoint allows remote attackers to change the password of a user account without proper verification or authentication. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no privileges required, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is limited to the affected user account, with a low impact on confidentiality and integrity but potentially medium impact on availability if the account is critical for system administration. The vulnerability was publicly disclosed on May 11, 2025, and although the vendor was contacted, no response or patch has been issued to date. No known exploits are currently observed in the wild, but the public disclosure increases the risk of exploitation. The lack of authentication or verification in the password change process represents a significant security flaw that could allow attackers to gain unauthorized access or disrupt administrative control over the ContiNew Admin system.

Potential Impact

For European organizations using ContiNew Admin, this vulnerability poses a tangible risk to system security and operational continuity. Unauthorized password changes could lead to unauthorized access to administrative accounts, enabling attackers to manipulate system configurations, access sensitive data, or disrupt services. This is particularly critical for organizations relying on ContiNew Admin for managing IT infrastructure or sensitive environments. The medium severity suggests that while the vulnerability may not lead to full system compromise immediately, it can serve as a foothold for further attacks or lateral movement within networks. Given the lack of vendor response and patches, European organizations face increased exposure, especially those in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure. The exploitability without user interaction and remotely accessible nature of the vulnerability further amplifies the threat, making timely mitigation essential to prevent potential breaches or service disruptions.

Mitigation Recommendations

European organizations should implement immediate compensating controls to mitigate this vulnerability in the absence of an official patch. These include restricting network access to the ContiNew Admin interface by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Enforce multi-factor authentication (MFA) on all administrative accounts to reduce the risk of unauthorized access even if passwords are changed. Monitor logs and audit trails for any unusual password change activities or unauthorized access attempts. If possible, disable or restrict access to the vulnerable API endpoint (/dev-api/system/user/1/password) until a patch is available. Conduct regular vulnerability scans and penetration tests focused on ContiNew Admin to detect exploitation attempts. Additionally, organizations should engage with the vendor or community for updates and consider alternative administrative tools if the vendor remains unresponsive. Finally, prepare incident response plans specifically addressing unauthorized access scenarios related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-10T15:45:14.197Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6e40

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 4:17:44 AM

Last updated: 8/17/2025, 1:34:45 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats