Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54968: n/a

0
High
VulnerabilityCVE-2025-54968cvecve-2025-54968
Published: Mon Oct 27 2025 (10/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.

AI-Powered Analysis

AILast updated: 11/03/2025, 17:47:25 UTC

Technical Analysis

CVE-2025-54968 is a vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial analysis and imagery exploitation tool widely used in defense and intelligence sectors. The vulnerability arises because the SOCET GXP Job Service does not enforce authentication, allowing unauthorized users to submit jobs remotely or locally. In some configurations, these jobs execute with the permissions of other users, potentially including privileged accounts. This lack of authentication (CWE-284) means an attacker with network access can submit arbitrary jobs, leading to unauthorized code execution, data manipulation, or service disruption. The CVSS 3.1 base score of 8.8 reflects the network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known yet, the vulnerability's characteristics make it a critical risk for organizations relying on SOCET GXP for sensitive geospatial data processing. The issue underscores the importance of proper authentication mechanisms in job submission services to prevent privilege escalation and unauthorized access.

Potential Impact

For European organizations, especially those in defense, intelligence, and critical infrastructure sectors, this vulnerability poses a significant risk. SOCET GXP is used for geospatial intelligence and imagery analysis, often involving sensitive or classified data. Exploitation could lead to unauthorized access to sensitive geospatial data, manipulation or destruction of critical intelligence, and disruption of operational workflows. The ability to execute jobs with other users' permissions could allow attackers to escalate privileges, move laterally within networks, and potentially compromise entire systems. This could undermine national security operations, intelligence gathering, and critical decision-making processes. Additionally, the disruption or manipulation of geospatial data could impact emergency response, border security, and infrastructure management. The lack of authentication increases the attack surface, making remote exploitation feasible without user interaction, thus raising the urgency for mitigation in European contexts where SOCET GXP is deployed.

Mitigation Recommendations

1. Upgrade SOCET GXP to version 4.6.0.2 or later where the authentication issue is resolved. 2. Restrict network access to the SOCET GXP Job Service by implementing network segmentation and firewall rules to limit access only to trusted hosts and users. 3. Implement strict access control policies and monitor job submissions for unusual activity or unauthorized access attempts. 4. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous job submission patterns. 5. Conduct regular audits of user permissions and job execution logs to identify potential misuse. 6. Where possible, isolate SOCET GXP environments handling sensitive data from general corporate networks to reduce exposure. 7. Educate system administrators and users about the risks of unauthenticated job submissions and enforce strong operational security practices. 8. Develop incident response plans specifically addressing potential exploitation of this vulnerability to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ffa364ba6dffc5e202ccd8

Added to database: 10/27/2025, 4:52:52 PM

Last enriched: 11/3/2025, 5:47:25 PM

Last updated: 12/12/2025, 3:18:15 PM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats