Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54966: n/a

0
Medium
VulnerabilityCVE-2025-54966cvecve-2025-54966
Published: Thu Oct 23 2025 (10/23/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in BAE SOCET GXP before 4.6.0.2. Some endpoints on the SOCET GXP Job Status Service may return sensitive information in certain situations, including local file paths and SOCET GXP version information.

AI-Powered Analysis

AILast updated: 10/23/2025, 20:21:03 UTC

Technical Analysis

CVE-2025-54966 is a security vulnerability identified in BAE Systems' SOCET GXP software, a geospatial analysis and imagery exploitation tool widely used in defense and intelligence sectors. The flaw exists in the SOCET GXP Job Status Service prior to version 4.6.0.2, where some endpoints may return sensitive information unintentionally. Specifically, these endpoints can leak local file paths and the version information of the SOCET GXP software. Such information disclosure vulnerabilities do not directly allow code execution or privilege escalation but provide attackers with valuable reconnaissance data that can facilitate further attacks, such as identifying software versions for targeted exploits or mapping internal directory structures. The vulnerability does not require authentication or user interaction, which means it could be exploited remotely if the service endpoints are exposed or accessible within an organization's network. No CVSS score has been assigned yet, and no public exploits have been reported. However, the exposure of internal paths and version details can aid attackers in crafting more effective attacks or social engineering campaigns. The absence of patches at the time of reporting indicates that organizations must rely on compensating controls until updates are released. Given the critical role of SOCET GXP in processing sensitive geospatial intelligence, this vulnerability poses a risk to confidentiality and potentially to operational security if exploited.

Potential Impact

For European organizations, especially those involved in defense, aerospace, intelligence, and geospatial analysis, this vulnerability could lead to unauthorized disclosure of sensitive operational details. The leakage of local file paths and software version information can assist threat actors in mapping the internal environment and identifying exploitable software versions, increasing the risk of targeted attacks. While this vulnerability does not directly compromise data integrity or availability, the information disclosed could be leveraged to facilitate more severe attacks, including lateral movement or privilege escalation within networks. European defense contractors and government agencies using SOCET GXP are particularly at risk, as the software is integral to mission-critical geospatial intelligence workflows. The exposure could undermine operational security and confidentiality, potentially impacting national security interests. Additionally, organizations subject to strict data protection regulations like GDPR must consider the implications of any sensitive data leakage and ensure appropriate incident response measures.

Mitigation Recommendations

1. Monitor for updates and patches from BAE Systems and apply them promptly once available to remediate the vulnerability. 2. Restrict network access to the SOCET GXP Job Status Service endpoints using network segmentation, firewalls, and access control lists to limit exposure only to authorized personnel and systems. 3. Implement strict authentication and authorization controls around SOCET GXP services to prevent unauthorized access. 4. Conduct regular security audits and penetration testing focused on SOCET GXP deployments to identify and remediate any additional information disclosure or security weaknesses. 5. Employ network monitoring and anomaly detection to identify unusual access patterns or reconnaissance attempts targeting SOCET GXP services. 6. Educate system administrators and users about the risks of information disclosure and the importance of safeguarding geospatial intelligence data. 7. Consider disabling or isolating the Job Status Service endpoints if they are not essential to operational workflows until a patch is available. 8. Maintain comprehensive logging and incident response plans tailored to SOCET GXP environments to quickly respond to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fa8ab1326f59cb11e6286d

Added to database: 10/23/2025, 8:06:09 PM

Last enriched: 10/23/2025, 8:21:03 PM

Last updated: 10/23/2025, 9:17:33 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats