CVE-2025-54554: CWE-863 Incorrect Authorization in Tera Insights tiCrypt
tiaudit in Tera Insights tiCrypt before 2025-07-17 allows unauthenticated REST API requests that reveal sensitive information about the underlying SQL queries and database structure.
AI Analysis
Technical Summary
CVE-2025-54554 is a medium-severity vulnerability identified in the Tera Insights tiCrypt product, specifically affecting the 'tiaudit' component prior to the 2025-07-17 update. The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. This flaw allows unauthenticated REST API requests to access sensitive information related to the underlying SQL queries and database schema. Because the vulnerability does not require any authentication or user interaction and can be exploited remotely (AV:N, PR:N, UI:N), an attacker can send crafted requests to the tiaudit REST API endpoint and retrieve details about the database structure and SQL queries used by the application. Although the vulnerability does not directly impact data integrity or availability, the exposure of database schema and query information can aid attackers in crafting more effective SQL injection or other targeted attacks, potentially leading to further compromise. The CVSS score of 5.3 reflects a medium severity, primarily due to the confidentiality impact and ease of exploitation without authentication. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.
Potential Impact
For European organizations using Tera Insights tiCrypt, this vulnerability poses a risk of information disclosure that could facilitate subsequent attacks. The exposure of database structure and SQL query details can enable attackers to identify weak points in the backend database, potentially leading to data breaches or unauthorized data manipulation if combined with other vulnerabilities. Organizations in sectors with sensitive or regulated data, such as finance, healthcare, and government, may face increased risks of compliance violations (e.g., GDPR) if attackers leverage this information to access personal or confidential data. Additionally, the lack of authentication requirement means that any external attacker with network access to the tiaudit REST API endpoint can attempt exploitation, increasing the attack surface. While the vulnerability itself does not cause direct service disruption, the downstream effects of information leakage could result in reputational damage, financial loss, and regulatory penalties for affected European entities.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately verify if their tiCrypt deployments are running versions prior to the 2025-07-17 fix date and plan for urgent upgrades once patches are available. 2) Restrict network access to the tiaudit REST API endpoint by implementing network segmentation and firewall rules to allow only trusted internal IP addresses or management systems. 3) Employ Web Application Firewalls (WAFs) or API gateways with rules to detect and block unauthorized REST API requests targeting tiaudit endpoints. 4) Conduct thorough logging and monitoring of REST API access to detect anomalous or unauthorized requests that could indicate exploitation attempts. 5) Review and harden authorization controls within the application configuration to ensure that sensitive audit information is not exposed to unauthenticated users. 6) Engage with Tera Insights support channels to obtain official patches or workarounds and stay informed about updates regarding this vulnerability. 7) Perform security assessments and penetration testing focused on REST API endpoints to identify and remediate similar authorization weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-54554: CWE-863 Incorrect Authorization in Tera Insights tiCrypt
Description
tiaudit in Tera Insights tiCrypt before 2025-07-17 allows unauthenticated REST API requests that reveal sensitive information about the underlying SQL queries and database structure.
AI-Powered Analysis
Technical Analysis
CVE-2025-54554 is a medium-severity vulnerability identified in the Tera Insights tiCrypt product, specifically affecting the 'tiaudit' component prior to the 2025-07-17 update. The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. This flaw allows unauthenticated REST API requests to access sensitive information related to the underlying SQL queries and database schema. Because the vulnerability does not require any authentication or user interaction and can be exploited remotely (AV:N, PR:N, UI:N), an attacker can send crafted requests to the tiaudit REST API endpoint and retrieve details about the database structure and SQL queries used by the application. Although the vulnerability does not directly impact data integrity or availability, the exposure of database schema and query information can aid attackers in crafting more effective SQL injection or other targeted attacks, potentially leading to further compromise. The CVSS score of 5.3 reflects a medium severity, primarily due to the confidentiality impact and ease of exploitation without authentication. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.
Potential Impact
For European organizations using Tera Insights tiCrypt, this vulnerability poses a risk of information disclosure that could facilitate subsequent attacks. The exposure of database structure and SQL query details can enable attackers to identify weak points in the backend database, potentially leading to data breaches or unauthorized data manipulation if combined with other vulnerabilities. Organizations in sectors with sensitive or regulated data, such as finance, healthcare, and government, may face increased risks of compliance violations (e.g., GDPR) if attackers leverage this information to access personal or confidential data. Additionally, the lack of authentication requirement means that any external attacker with network access to the tiaudit REST API endpoint can attempt exploitation, increasing the attack surface. While the vulnerability itself does not cause direct service disruption, the downstream effects of information leakage could result in reputational damage, financial loss, and regulatory penalties for affected European entities.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately verify if their tiCrypt deployments are running versions prior to the 2025-07-17 fix date and plan for urgent upgrades once patches are available. 2) Restrict network access to the tiaudit REST API endpoint by implementing network segmentation and firewall rules to allow only trusted internal IP addresses or management systems. 3) Employ Web Application Firewalls (WAFs) or API gateways with rules to detect and block unauthorized REST API requests targeting tiaudit endpoints. 4) Conduct thorough logging and monitoring of REST API access to detect anomalous or unauthorized requests that could indicate exploitation attempts. 5) Review and harden authorization controls within the application configuration to ensure that sensitive audit information is not exposed to unauthenticated users. 6) Engage with Tera Insights support channels to obtain official patches or workarounds and stay informed about updates regarding this vulnerability. 7) Perform security assessments and penetration testing focused on REST API endpoints to identify and remediate similar authorization weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-07-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689151abad5a09ad00e45170
Added to database: 8/5/2025, 12:34:51 AM
Last enriched: 8/12/2025, 12:57:25 AM
Last updated: 11/2/2025, 7:29:36 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12593: Unrestricted Upload in code-projects Simple Online Hotel Reservation System
MediumCVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.