CVE-2025-46575: CWE-209 Generation of Error Message Containing Sensitive Information in ZTE GoldenDB
There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.
AI Analysis
Technical Summary
CVE-2025-46575 is an information disclosure vulnerability identified in ZTE's GoldenDB database product, specifically affecting versions 6.1.03.09, 7.2.01.01, and Lite7.2.01.01. The vulnerability is classified under CWE-209, which pertains to the generation of error messages that contain sensitive information. In this case, the flaw allows attackers to exploit error messages produced by GoldenDB to extract sensitive system information. Such information could include configuration details, internal database schema, or other data that could facilitate further attacks. The vulnerability has a CVSS 3.1 base score of 4.9, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been publicly released yet. The vulnerability's root cause lies in the database's error handling mechanism, which inadvertently leaks sensitive information through error messages, potentially aiding attackers in reconnaissance or privilege escalation efforts.
Potential Impact
For European organizations using ZTE GoldenDB, this vulnerability poses a moderate risk primarily to confidentiality. Since the flaw allows disclosure of sensitive system information through error messages, attackers with high privileges could leverage this information to map the system environment, identify further vulnerabilities, or plan more targeted attacks. Although exploitation requires high privileges, in environments where internal threat actors or compromised privileged accounts exist, this vulnerability could facilitate lateral movement or data exfiltration. The lack of impact on integrity and availability reduces the risk of direct data manipulation or service disruption. However, the exposure of sensitive configuration or system details could undermine security postures, especially in sectors handling critical infrastructure, finance, or personal data. Given that GoldenDB is a database product, any leakage of schema or configuration details could also indirectly expose sensitive business information. The absence of known exploits in the wild reduces immediate risk, but organizations should remain vigilant.
Mitigation Recommendations
1. Restrict access to GoldenDB error messages by configuring the database and application layers to suppress detailed error outputs, ensuring that only generic error messages are returned to users, especially those with lower privileges. 2. Implement strict access controls and monitoring for privileged accounts, as exploitation requires high privileges; use multi-factor authentication and regular auditing to prevent unauthorized privilege escalation. 3. Employ network segmentation to limit exposure of GoldenDB instances to trusted internal networks only, reducing the attack surface. 4. Monitor logs for unusual error message requests or patterns that could indicate attempts to exploit this vulnerability. 5. Engage with ZTE for timely updates or patches addressing this vulnerability and plan for rapid deployment once available. 6. Conduct internal security assessments and penetration tests focusing on error handling and information leakage in GoldenDB deployments. 7. Educate database administrators and developers on secure error handling practices to prevent similar issues in custom integrations or applications interfacing with GoldenDB.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-46575: CWE-209 Generation of Error Message Containing Sensitive Information in ZTE GoldenDB
Description
There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-46575 is an information disclosure vulnerability identified in ZTE's GoldenDB database product, specifically affecting versions 6.1.03.09, 7.2.01.01, and Lite7.2.01.01. The vulnerability is classified under CWE-209, which pertains to the generation of error messages that contain sensitive information. In this case, the flaw allows attackers to exploit error messages produced by GoldenDB to extract sensitive system information. Such information could include configuration details, internal database schema, or other data that could facilitate further attacks. The vulnerability has a CVSS 3.1 base score of 4.9, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been publicly released yet. The vulnerability's root cause lies in the database's error handling mechanism, which inadvertently leaks sensitive information through error messages, potentially aiding attackers in reconnaissance or privilege escalation efforts.
Potential Impact
For European organizations using ZTE GoldenDB, this vulnerability poses a moderate risk primarily to confidentiality. Since the flaw allows disclosure of sensitive system information through error messages, attackers with high privileges could leverage this information to map the system environment, identify further vulnerabilities, or plan more targeted attacks. Although exploitation requires high privileges, in environments where internal threat actors or compromised privileged accounts exist, this vulnerability could facilitate lateral movement or data exfiltration. The lack of impact on integrity and availability reduces the risk of direct data manipulation or service disruption. However, the exposure of sensitive configuration or system details could undermine security postures, especially in sectors handling critical infrastructure, finance, or personal data. Given that GoldenDB is a database product, any leakage of schema or configuration details could also indirectly expose sensitive business information. The absence of known exploits in the wild reduces immediate risk, but organizations should remain vigilant.
Mitigation Recommendations
1. Restrict access to GoldenDB error messages by configuring the database and application layers to suppress detailed error outputs, ensuring that only generic error messages are returned to users, especially those with lower privileges. 2. Implement strict access controls and monitoring for privileged accounts, as exploitation requires high privileges; use multi-factor authentication and regular auditing to prevent unauthorized privilege escalation. 3. Employ network segmentation to limit exposure of GoldenDB instances to trusted internal networks only, reducing the attack surface. 4. Monitor logs for unusual error message requests or patterns that could indicate attempts to exploit this vulnerability. 5. Engage with ZTE for timely updates or patches addressing this vulnerability and plan for rapid deployment once available. 6. Conduct internal security assessments and penetration tests focusing on error handling and information leakage in GoldenDB deployments. 7. Educate database administrators and developers on secure error handling practices to prevent similar issues in custom integrations or applications interfacing with GoldenDB.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2025-04-25T00:28:13.908Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef806
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 7:05:10 PM
Last updated: 8/18/2025, 11:33:47 PM
Views: 11
Related Threats
CVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.