CVE-2025-54966: n/a
An issue was discovered in BAE SOCET GXP before 4.6.0.2. Some endpoints on the SOCET GXP Job Status Service may return sensitive information in certain situations, including local file paths and SOCET GXP version information.
AI Analysis
Technical Summary
CVE-2025-54966 is an information disclosure vulnerability identified in BAE Systems' SOCET GXP software, a geospatial intelligence and imagery analysis tool widely used in defense and intelligence sectors. The vulnerability affects versions prior to 4.6.0.2 and resides in the SOCET GXP Job Status Service. Specifically, some endpoints of this service may return sensitive information under certain conditions, including local file system paths and the exact version of the SOCET GXP software in use. This leakage is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability requires network access (AV:N) and low privileges (PR:L) but does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 4.3, indicating medium severity, primarily due to confidentiality impact without affecting integrity or availability. Although no public exploits are known, the disclosure of internal paths and version information can facilitate attackers in crafting targeted attacks or identifying further vulnerabilities. The absence of patches at the time of reporting necessitates interim mitigations. Given SOCET GXP's role in sensitive geospatial analysis, unauthorized disclosure of environment details could have operational security implications.
Potential Impact
For European organizations, especially those in defense, intelligence, and geospatial analysis, this vulnerability poses a risk of sensitive information leakage that could aid adversaries in reconnaissance and subsequent exploitation attempts. Disclosure of local file paths may reveal system architecture, deployment configurations, or sensitive project directories, potentially exposing operational details. Version information disclosure can assist attackers in identifying unpatched systems or known vulnerabilities specific to that version. While the vulnerability does not directly compromise data integrity or system availability, the confidentiality breach could undermine operational security and strategic advantage. Organizations handling classified or sensitive geospatial data could face increased risk of targeted cyber espionage or intrusion attempts. The impact is more pronounced in environments where SOCET GXP is integrated with other critical systems or where network segmentation is insufficient.
Mitigation Recommendations
1. Restrict network access to the SOCET GXP Job Status Service endpoints by implementing strict firewall rules and network segmentation, allowing only trusted hosts and administrators to communicate with the service. 2. Monitor network traffic and logs for unusual or unauthorized queries to the Job Status Service endpoints to detect reconnaissance activities early. 3. Apply the official patch or upgrade to SOCET GXP version 4.6.0.2 or later as soon as it becomes available to remediate the vulnerability. 4. Conduct regular security assessments and penetration tests focusing on SOCET GXP deployments to identify any residual information leakage or misconfigurations. 5. Implement strict access controls and least privilege principles for users interacting with SOCET GXP services to minimize exposure. 6. Educate system administrators and security teams about this vulnerability and the importance of safeguarding geospatial intelligence systems. 7. If patching is delayed, consider deploying web application firewalls (WAFs) or reverse proxies that can filter or block sensitive information in responses from the affected endpoints.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Poland, Netherlands
CVE-2025-54966: n/a
Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. Some endpoints on the SOCET GXP Job Status Service may return sensitive information in certain situations, including local file paths and SOCET GXP version information.
AI-Powered Analysis
Technical Analysis
CVE-2025-54966 is an information disclosure vulnerability identified in BAE Systems' SOCET GXP software, a geospatial intelligence and imagery analysis tool widely used in defense and intelligence sectors. The vulnerability affects versions prior to 4.6.0.2 and resides in the SOCET GXP Job Status Service. Specifically, some endpoints of this service may return sensitive information under certain conditions, including local file system paths and the exact version of the SOCET GXP software in use. This leakage is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability requires network access (AV:N) and low privileges (PR:L) but does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 4.3, indicating medium severity, primarily due to confidentiality impact without affecting integrity or availability. Although no public exploits are known, the disclosure of internal paths and version information can facilitate attackers in crafting targeted attacks or identifying further vulnerabilities. The absence of patches at the time of reporting necessitates interim mitigations. Given SOCET GXP's role in sensitive geospatial analysis, unauthorized disclosure of environment details could have operational security implications.
Potential Impact
For European organizations, especially those in defense, intelligence, and geospatial analysis, this vulnerability poses a risk of sensitive information leakage that could aid adversaries in reconnaissance and subsequent exploitation attempts. Disclosure of local file paths may reveal system architecture, deployment configurations, or sensitive project directories, potentially exposing operational details. Version information disclosure can assist attackers in identifying unpatched systems or known vulnerabilities specific to that version. While the vulnerability does not directly compromise data integrity or system availability, the confidentiality breach could undermine operational security and strategic advantage. Organizations handling classified or sensitive geospatial data could face increased risk of targeted cyber espionage or intrusion attempts. The impact is more pronounced in environments where SOCET GXP is integrated with other critical systems or where network segmentation is insufficient.
Mitigation Recommendations
1. Restrict network access to the SOCET GXP Job Status Service endpoints by implementing strict firewall rules and network segmentation, allowing only trusted hosts and administrators to communicate with the service. 2. Monitor network traffic and logs for unusual or unauthorized queries to the Job Status Service endpoints to detect reconnaissance activities early. 3. Apply the official patch or upgrade to SOCET GXP version 4.6.0.2 or later as soon as it becomes available to remediate the vulnerability. 4. Conduct regular security assessments and penetration tests focusing on SOCET GXP deployments to identify any residual information leakage or misconfigurations. 5. Implement strict access controls and least privilege principles for users interacting with SOCET GXP services to minimize exposure. 6. Educate system administrators and security teams about this vulnerability and the importance of safeguarding geospatial intelligence systems. 7. If patching is delayed, consider deploying web application firewalls (WAFs) or reverse proxies that can filter or block sensitive information in responses from the affected endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fa8ab1326f59cb11e6286d
Added to database: 10/23/2025, 8:06:09 PM
Last enriched: 10/31/2025, 6:52:32 AM
Last updated: 12/4/2025, 6:53:22 AM
Views: 151
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumNation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.