Skip to main content

CVE-2025-48746: n/a

Medium
VulnerabilityCVE-2025-48746cvecve-2025-48746
Published: Wed May 28 2025 (05/28/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.

AI-Powered Analysis

AILast updated: 07/07/2025, 04:39:48 UTC

Technical Analysis

CVE-2025-48746 is a medium-severity vulnerability affecting Netwrix Directory Manager (formerly Imanami GroupID) versions 11.0.0.0 and earlier, as well as versions after 11.1.25134.03. The core issue is a lack of authentication for a critical function within the software, classified under CWE-287 (Improper Authentication). This means that certain sensitive operations can be performed without verifying the identity or privileges of the user or process invoking them. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a moderate risk level. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N reveals that the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, and it impacts confidentiality and integrity to a limited extent, but does not affect availability. The lack of authentication on a critical function could allow an unauthenticated attacker to access or modify sensitive directory management data or configurations, potentially leading to unauthorized information disclosure or unauthorized changes to directory settings. However, no known exploits are currently reported in the wild, and no patches or vendor advisories are linked yet. The vulnerability affects a product widely used for directory and identity management in enterprise environments, which often integrate with Active Directory and other identity stores to manage user permissions and access rights.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of directory management data, which is foundational to identity and access management (IAM) systems. Exploitation could lead to unauthorized disclosure of sensitive user or system information and unauthorized modifications to directory configurations, potentially enabling privilege escalation or lateral movement within corporate networks. Given the critical role of directory management in compliance with GDPR and other data protection regulations, such unauthorized access or changes could result in regulatory violations, data breaches, and reputational damage. Organizations relying on Netwrix Directory Manager for managing user access and permissions in Europe should be particularly vigilant, as attackers exploiting this vulnerability could bypass authentication controls and compromise identity management processes. The lack of availability impact reduces the risk of service disruption, but the confidentiality and integrity risks remain significant for sensitive environments.

Mitigation Recommendations

European organizations using Netwrix Directory Manager should immediately audit their deployments to identify affected versions. Until a vendor patch is available, organizations should implement network-level access controls to restrict access to the directory management interface only to trusted administrative hosts and networks. Employ network segmentation and firewall rules to limit exposure of the management interface to the internet or untrusted internal networks. Monitor logs for any unauthorized or suspicious access attempts to directory management functions. Implement multi-factor authentication (MFA) at the network or VPN level to add an additional layer of protection. Review and tighten permissions on directory management accounts and ensure the principle of least privilege is enforced. Stay alert for vendor advisories and apply patches promptly once released. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous access patterns related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6837447f182aa0cae2557b2d

Added to database: 5/28/2025, 5:14:39 PM

Last enriched: 7/7/2025, 4:39:48 AM

Last updated: 8/8/2025, 2:22:15 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats