CVE-2025-4558: CWE-620 Unverified Password Change in WormHole Tech GPM
The GPM from WormHole Tech has an Unverified Password Change vulnerability, allowing unauthenticated remote attackers to change any user's password and use the modified password to log into the system.
AI Analysis
Technical Summary
CVE-2025-4558 is a critical security vulnerability identified in the GPM product developed by WormHole Tech. The vulnerability is classified under CWE-620, which refers to an Unverified Password Change flaw. This vulnerability allows an unauthenticated remote attacker to change any user's password without verification. Essentially, the system fails to properly authenticate or verify the identity of the requester before allowing a password change operation. As a result, an attacker can arbitrarily reset passwords for any user account, including privileged or administrative accounts, and subsequently gain unauthorized access by logging in with the new password. The vulnerability has a CVSS 3.1 base score of 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) highlights that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of disclosure. The vulnerability affects version 0 of the GPM product, which may imply an initial or early release version. The lack of authentication in the password change process represents a severe security design flaw, exposing the system to complete compromise by attackers who can remotely reset passwords and assume control over user accounts.
Potential Impact
For European organizations using WormHole Tech's GPM product, this vulnerability poses a significant risk. Successful exploitation would allow attackers to gain unauthorized access to critical systems by resetting user passwords without any authentication. This could lead to data breaches involving sensitive personal or corporate data, disruption of business operations, and potential lateral movement within networks. The high impact on confidentiality, integrity, and availability means attackers could exfiltrate data, modify or delete information, and cause service outages. Given the unauthenticated nature of the attack, threat actors do not require prior access or user interaction, increasing the likelihood of exploitation. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe could face severe operational and reputational damage. Additionally, compliance with GDPR and other data protection regulations could be jeopardized due to unauthorized access and potential data leaks. The absence of patches further elevates the urgency for mitigation.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include restricting network access to the GPM management interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Monitoring and logging all password change requests and authentication events on GPM systems can help detect suspicious activity early. Organizations should enforce multi-factor authentication (MFA) on all administrative and user accounts where possible, even if the product itself does not support it natively, by integrating with external identity providers or access gateways. Additionally, temporary disabling or restricting password change functionality on the affected GPM systems until a patch is released can reduce risk. Regular vulnerability scanning and penetration testing should be conducted to identify any exploitation attempts. Finally, organizations should maintain close communication with WormHole Tech for updates on patches or official mitigations and prepare incident response plans specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-4558: CWE-620 Unverified Password Change in WormHole Tech GPM
Description
The GPM from WormHole Tech has an Unverified Password Change vulnerability, allowing unauthenticated remote attackers to change any user's password and use the modified password to log into the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-4558 is a critical security vulnerability identified in the GPM product developed by WormHole Tech. The vulnerability is classified under CWE-620, which refers to an Unverified Password Change flaw. This vulnerability allows an unauthenticated remote attacker to change any user's password without verification. Essentially, the system fails to properly authenticate or verify the identity of the requester before allowing a password change operation. As a result, an attacker can arbitrarily reset passwords for any user account, including privileged or administrative accounts, and subsequently gain unauthorized access by logging in with the new password. The vulnerability has a CVSS 3.1 base score of 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) highlights that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of disclosure. The vulnerability affects version 0 of the GPM product, which may imply an initial or early release version. The lack of authentication in the password change process represents a severe security design flaw, exposing the system to complete compromise by attackers who can remotely reset passwords and assume control over user accounts.
Potential Impact
For European organizations using WormHole Tech's GPM product, this vulnerability poses a significant risk. Successful exploitation would allow attackers to gain unauthorized access to critical systems by resetting user passwords without any authentication. This could lead to data breaches involving sensitive personal or corporate data, disruption of business operations, and potential lateral movement within networks. The high impact on confidentiality, integrity, and availability means attackers could exfiltrate data, modify or delete information, and cause service outages. Given the unauthenticated nature of the attack, threat actors do not require prior access or user interaction, increasing the likelihood of exploitation. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe could face severe operational and reputational damage. Additionally, compliance with GDPR and other data protection regulations could be jeopardized due to unauthorized access and potential data leaks. The absence of patches further elevates the urgency for mitigation.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include restricting network access to the GPM management interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Monitoring and logging all password change requests and authentication events on GPM systems can help detect suspicious activity early. Organizations should enforce multi-factor authentication (MFA) on all administrative and user accounts where possible, even if the product itself does not support it natively, by integrating with external identity providers or access gateways. Additionally, temporary disabling or restricting password change functionality on the affected GPM systems until a patch is released can reduce risk. Regular vulnerability scanning and penetration testing should be conducted to identify any exploitation attempts. Finally, organizations should maintain close communication with WormHole Tech for updates on patches or official mitigations and prepare incident response plans specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-05-12T01:49:30.350Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6b33
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:34:53 AM
Last updated: 8/6/2025, 7:29:36 PM
Views: 8
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.