Skip to main content

CVE-2025-52460: Files or directories accessible to external parties in DOS Co., Ltd. SS1

Medium
VulnerabilityCVE-2025-52460cvecve-2025-52460
Published: Thu Aug 28 2025 (08/28/2025, 08:27:52 UTC)
Source: CVE Database V5
Vendor/Project: DOS Co., Ltd.
Product: SS1

Description

Files or directories accessible to external parties issue exists in SS1 Ver.16.0.0.10 and earlier (Media version:16.0.0a and earlier). If exploited, uploaded files and SS1 configuration files may be accessed by a remote unauthenticated attacker.

AI-Powered Analysis

AILast updated: 08/28/2025, 09:04:08 UTC

Technical Analysis

CVE-2025-52460 is a medium-severity vulnerability affecting DOS Co., Ltd.'s SS1 product, specifically versions 16.0.0.10 and earlier (including Media version 16.0.0a and earlier) running in Windows environments. The vulnerability allows remote unauthenticated attackers to access files or directories that should not be externally accessible. This includes uploaded files and SS1 configuration files. The vulnerability arises from improper access controls on certain files or directories, enabling attackers to retrieve sensitive information without authentication or user interaction. The CVSS 3.0 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality, as integrity and availability are not affected. No known exploits are currently reported in the wild, but the exposure of configuration files and uploaded data could lead to information disclosure, potentially aiding further attacks or reconnaissance.

Potential Impact

For European organizations using DOS Co., Ltd.'s SS1 product in Windows environments, this vulnerability poses a risk of unauthorized data disclosure. Access to configuration files may reveal sensitive system settings, credentials, or network information, which could facilitate lateral movement or targeted attacks. Uploaded files accessible externally might contain confidential business data or personally identifiable information (PII), leading to privacy violations and regulatory non-compliance under GDPR. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can damage organizational reputation, result in financial penalties, and increase exposure to follow-on attacks. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, are particularly vulnerable to the consequences of such information leaks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first identify all instances of SS1 running on Windows platforms and verify the version. Immediate upgrade to a fixed version beyond 16.0.0.10 or Media version 16.0.0a is recommended once patches are available. In the absence of patches, implement strict network segmentation and firewall rules to restrict external access to SS1 servers, especially limiting HTTP/HTTPS or file-sharing ports. Review and harden file system permissions to ensure that sensitive directories and uploaded files are not publicly accessible. Employ web application firewalls (WAFs) to detect and block unauthorized file access attempts. Conduct regular audits and monitoring of access logs to detect suspicious activity. Additionally, consider encrypting sensitive uploaded files and configuration data at rest to reduce the impact of unauthorized access. Finally, raise user awareness about the risks of uploading sensitive data to vulnerable systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-08-25T06:42:31.576Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b017b8ad5a09ad006b3bea

Added to database: 8/28/2025, 8:47:52 AM

Last enriched: 8/28/2025, 9:04:08 AM

Last updated: 9/4/2025, 10:24:29 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats