Skip to main content

CVE-2025-46575: CWE-209 Generation of Error Message Containing Sensitive Information in ZTE GoldenDB

Medium
VulnerabilityCVE-2025-46575cvecve-2025-46575cwe-209
Published: Sun Apr 27 2025 (04/27/2025, 01:12:36 UTC)
Source: CVE
Vendor/Project: ZTE
Product: GoldenDB

Description

There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:05:10 UTC

Technical Analysis

CVE-2025-46575 is an information disclosure vulnerability identified in ZTE's GoldenDB database product, specifically affecting versions 6.1.03.09, 7.2.01.01, and Lite7.2.01.01. The vulnerability is classified under CWE-209, which pertains to the generation of error messages that contain sensitive information. In this case, the flaw allows attackers to exploit error messages produced by GoldenDB to extract sensitive system information. Such information could include configuration details, internal database schema, or other data that could facilitate further attacks. The vulnerability has a CVSS 3.1 base score of 4.9, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been publicly released yet. The vulnerability's root cause lies in the database's error handling mechanism, which inadvertently leaks sensitive information through error messages, potentially aiding attackers in reconnaissance or privilege escalation efforts.

Potential Impact

For European organizations using ZTE GoldenDB, this vulnerability poses a moderate risk primarily to confidentiality. Since the flaw allows disclosure of sensitive system information through error messages, attackers with high privileges could leverage this information to map the system environment, identify further vulnerabilities, or plan more targeted attacks. Although exploitation requires high privileges, in environments where internal threat actors or compromised privileged accounts exist, this vulnerability could facilitate lateral movement or data exfiltration. The lack of impact on integrity and availability reduces the risk of direct data manipulation or service disruption. However, the exposure of sensitive configuration or system details could undermine security postures, especially in sectors handling critical infrastructure, finance, or personal data. Given that GoldenDB is a database product, any leakage of schema or configuration details could also indirectly expose sensitive business information. The absence of known exploits in the wild reduces immediate risk, but organizations should remain vigilant.

Mitigation Recommendations

1. Restrict access to GoldenDB error messages by configuring the database and application layers to suppress detailed error outputs, ensuring that only generic error messages are returned to users, especially those with lower privileges. 2. Implement strict access controls and monitoring for privileged accounts, as exploitation requires high privileges; use multi-factor authentication and regular auditing to prevent unauthorized privilege escalation. 3. Employ network segmentation to limit exposure of GoldenDB instances to trusted internal networks only, reducing the attack surface. 4. Monitor logs for unusual error message requests or patterns that could indicate attempts to exploit this vulnerability. 5. Engage with ZTE for timely updates or patches addressing this vulnerability and plan for rapid deployment once available. 6. Conduct internal security assessments and penetration tests focusing on error handling and information leakage in GoldenDB deployments. 7. Educate database administrators and developers on secure error handling practices to prevent similar issues in custom integrations or applications interfacing with GoldenDB.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2025-04-25T00:28:13.908Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef806

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 7:05:10 PM

Last updated: 8/18/2025, 11:33:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats