Skip to main content

CVE-2025-49852: CWE-918 Server-Side Request Forgery (SSRF) in ControlID iDSecure On-premises

High
VulnerabilityCVE-2025-49852cvecve-2025-49852cwe-918
Published: Tue Jun 24 2025 (06/24/2025, 19:19:42 UTC)
Source: CVE Database V5
Vendor/Project: ControlID
Product: iDSecure On-premises

Description

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to a server-side request forgery vulnerability which could allow an unauthenticated attacker to retrieve information from other servers.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:49:19 UTC

Technical Analysis

CVE-2025-49852 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in ControlID's iDSecure On-premises product, specifically affecting versions 4.7.48.0 and earlier. SSRF vulnerabilities occur when an attacker can manipulate a vulnerable server to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network controls and accessing sensitive information. In this case, the vulnerability allows an unauthenticated attacker to coerce the iDSecure server into sending requests to other internal or external servers, thereby retrieving information that would otherwise be inaccessible. The vulnerability is notable for requiring no authentication or user interaction, making exploitation relatively straightforward. The CVSS 4.0 base score of 8.7 reflects the critical nature of this flaw, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is primarily on confidentiality (VC:H), with no direct impact on integrity or availability. The vulnerability affects on-premises deployments of iDSecure, a security management system commonly used for access control and identity management in physical security environments. Since the product is deployed on-premises, organizations running this software internally are at risk of internal network exposure or external exploitation if the system is reachable from untrusted networks. No public exploits are currently known, and no patches have been released at the time of publication, increasing the urgency for organizations to monitor for updates and implement mitigations.

Potential Impact

For European organizations, the impact of this SSRF vulnerability can be significant, especially for those relying on ControlID iDSecure On-premises for physical access control and identity management. Successful exploitation could lead to unauthorized disclosure of sensitive internal network information, potentially exposing internal services, configuration data, or other protected resources. This could facilitate further lateral movement or targeted attacks within the network. Given that the vulnerability requires no authentication and no user interaction, attackers could remotely exploit exposed instances, increasing the risk of data breaches or espionage. Organizations in sectors with stringent security requirements such as government, critical infrastructure, finance, and manufacturing could face regulatory and operational consequences if sensitive information is leaked. Additionally, the on-premises nature of the product means that internal network segmentation and firewall policies are critical; misconfigurations could exacerbate the risk. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the impact could be severe.

Mitigation Recommendations

1. Immediate Network Segmentation: Restrict network access to the iDSecure On-premises server to trusted management networks only, blocking all unnecessary inbound and outbound traffic to reduce exposure. 2. Implement Strict Egress Filtering: Configure firewalls to limit the server’s ability to make outbound HTTP/HTTPS requests to only essential destinations, preventing SSRF exploitation from reaching internal or external targets. 3. Monitor Network Traffic: Deploy IDS/IPS solutions to detect anomalous outbound requests originating from the iDSecure server that could indicate SSRF exploitation attempts. 4. Apply Vendor Patches Promptly: Although no patches are currently available, organizations should prioritize applying updates as soon as ControlID releases a fix. 5. Conduct Internal Audits: Review and harden the configuration of the iDSecure system, disabling any unnecessary features or services that could be leveraged in SSRF attacks. 6. Use Web Application Firewalls (WAF): If applicable, deploy WAF rules to detect and block SSRF attack patterns targeting the iDSecure interface. 7. Incident Response Preparedness: Prepare for potential exploitation by establishing monitoring and response plans specific to SSRF indicators and ControlID product logs. These steps go beyond generic advice by focusing on network-level controls and proactive monitoring tailored to the nature of SSRF in an on-premises security management system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-06-11T15:48:15.494Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685afdb566faf0c1de3b03a4

Added to database: 6/24/2025, 7:34:13 PM

Last enriched: 6/24/2025, 7:49:19 PM

Last updated: 8/12/2025, 2:52:04 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats