Skip to main content

CVE-2025-54554: CWE-863 Incorrect Authorization in Tera Insights tiCrypt

Medium
VulnerabilityCVE-2025-54554cvecve-2025-54554cwe-863
Published: Mon Aug 04 2025 (08/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Tera Insights
Product: tiCrypt

Description

tiaudit in Tera Insights tiCrypt before 2025-07-17 allows unauthenticated REST API requests that reveal sensitive information about the underlying SQL queries and database structure.

AI-Powered Analysis

AILast updated: 08/12/2025, 00:57:25 UTC

Technical Analysis

CVE-2025-54554 is a medium-severity vulnerability identified in the Tera Insights tiCrypt product, specifically affecting the 'tiaudit' component prior to the 2025-07-17 update. The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. This flaw allows unauthenticated REST API requests to access sensitive information related to the underlying SQL queries and database schema. Because the vulnerability does not require any authentication or user interaction and can be exploited remotely (AV:N, PR:N, UI:N), an attacker can send crafted requests to the tiaudit REST API endpoint and retrieve details about the database structure and SQL queries used by the application. Although the vulnerability does not directly impact data integrity or availability, the exposure of database schema and query information can aid attackers in crafting more effective SQL injection or other targeted attacks, potentially leading to further compromise. The CVSS score of 5.3 reflects a medium severity, primarily due to the confidentiality impact and ease of exploitation without authentication. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.

Potential Impact

For European organizations using Tera Insights tiCrypt, this vulnerability poses a risk of information disclosure that could facilitate subsequent attacks. The exposure of database structure and SQL query details can enable attackers to identify weak points in the backend database, potentially leading to data breaches or unauthorized data manipulation if combined with other vulnerabilities. Organizations in sectors with sensitive or regulated data, such as finance, healthcare, and government, may face increased risks of compliance violations (e.g., GDPR) if attackers leverage this information to access personal or confidential data. Additionally, the lack of authentication requirement means that any external attacker with network access to the tiaudit REST API endpoint can attempt exploitation, increasing the attack surface. While the vulnerability itself does not cause direct service disruption, the downstream effects of information leakage could result in reputational damage, financial loss, and regulatory penalties for affected European entities.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately verify if their tiCrypt deployments are running versions prior to the 2025-07-17 fix date and plan for urgent upgrades once patches are available. 2) Restrict network access to the tiaudit REST API endpoint by implementing network segmentation and firewall rules to allow only trusted internal IP addresses or management systems. 3) Employ Web Application Firewalls (WAFs) or API gateways with rules to detect and block unauthorized REST API requests targeting tiaudit endpoints. 4) Conduct thorough logging and monitoring of REST API access to detect anomalous or unauthorized requests that could indicate exploitation attempts. 5) Review and harden authorization controls within the application configuration to ensure that sensitive audit information is not exposed to unauthenticated users. 6) Engage with Tera Insights support channels to obtain official patches or workarounds and stay informed about updates regarding this vulnerability. 7) Perform security assessments and penetration testing focused on REST API endpoints to identify and remediate similar authorization weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-07-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689151abad5a09ad00e45170

Added to database: 8/5/2025, 12:34:51 AM

Last enriched: 8/12/2025, 12:57:25 AM

Last updated: 9/14/2025, 1:45:17 PM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats