CVE-2025-54968: n/a
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
AI Analysis
Technical Summary
CVE-2025-54968 is a security vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial imagery exploitation tool widely used in defense, intelligence, and mapping sectors. The vulnerability arises because the SOCET GXP Job Service component does not enforce authentication. This means that in certain configurations, remote attackers can submit jobs to the service without any credentials, potentially causing unauthorized execution of tasks. Additionally, local users can submit jobs that execute with the permissions of other users, leading to privilege escalation. The Job Service typically handles processing tasks related to imagery analysis, so unauthorized job submissions could manipulate or disrupt critical geospatial data processing workflows. Although no public exploits have been reported, the absence of authentication represents a significant security weakness. The vulnerability's impact depends on the deployment environment and network exposure of the Job Service. Since SOCET GXP is used in sensitive environments, exploitation could compromise confidentiality, integrity, and availability of geospatial intelligence data. No CVSS score has been assigned yet, and no patches are currently linked, indicating the need for immediate attention from users of affected versions.
Potential Impact
For European organizations, especially those in defense, intelligence, and critical infrastructure sectors, this vulnerability poses a serious risk. Unauthorized job submissions could allow attackers to manipulate geospatial data processing, potentially leading to incorrect intelligence outputs or disruption of operational workflows. Privilege escalation through local job submissions could enable attackers to gain elevated access, compromising system integrity and confidentiality. Given SOCET GXP's role in military and governmental geospatial analysis, exploitation could undermine national security operations or critical decision-making processes. The impact extends to any organization relying on SOCET GXP for sensitive imagery analysis, including mapping agencies and security services. The lack of authentication increases the attack surface, particularly if the Job Service is exposed to less secure network segments. While no known exploits exist yet, the vulnerability's nature suggests a high potential for abuse if weaponized. This could lead to data tampering, denial of service, or unauthorized access to sensitive geospatial information.
Mitigation Recommendations
Organizations should immediately review their SOCET GXP deployments to identify if the Job Service is exposed to untrusted networks and restrict access accordingly using network segmentation and firewall rules. Until a patch is available, disable or isolate the Job Service if feasible to prevent unauthorized job submissions. Implement strict access controls and monitoring on systems running SOCET GXP to detect anomalous job submissions or privilege escalations. Employ host-based intrusion detection systems to alert on suspicious activity related to the Job Service. Coordinate with BAE Systems for timely updates and apply patches as soon as they are released. Conduct thorough audits of user permissions and ensure that local users do not have unnecessary privileges that could be exploited. Additionally, consider deploying application-layer authentication proxies or VPNs to enforce authentication around the Job Service. Regularly review logs for unauthorized job submissions and investigate any anomalies promptly.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Norway, Finland
CVE-2025-54968: n/a
Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
AI-Powered Analysis
Technical Analysis
CVE-2025-54968 is a security vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial imagery exploitation tool widely used in defense, intelligence, and mapping sectors. The vulnerability arises because the SOCET GXP Job Service component does not enforce authentication. This means that in certain configurations, remote attackers can submit jobs to the service without any credentials, potentially causing unauthorized execution of tasks. Additionally, local users can submit jobs that execute with the permissions of other users, leading to privilege escalation. The Job Service typically handles processing tasks related to imagery analysis, so unauthorized job submissions could manipulate or disrupt critical geospatial data processing workflows. Although no public exploits have been reported, the absence of authentication represents a significant security weakness. The vulnerability's impact depends on the deployment environment and network exposure of the Job Service. Since SOCET GXP is used in sensitive environments, exploitation could compromise confidentiality, integrity, and availability of geospatial intelligence data. No CVSS score has been assigned yet, and no patches are currently linked, indicating the need for immediate attention from users of affected versions.
Potential Impact
For European organizations, especially those in defense, intelligence, and critical infrastructure sectors, this vulnerability poses a serious risk. Unauthorized job submissions could allow attackers to manipulate geospatial data processing, potentially leading to incorrect intelligence outputs or disruption of operational workflows. Privilege escalation through local job submissions could enable attackers to gain elevated access, compromising system integrity and confidentiality. Given SOCET GXP's role in military and governmental geospatial analysis, exploitation could undermine national security operations or critical decision-making processes. The impact extends to any organization relying on SOCET GXP for sensitive imagery analysis, including mapping agencies and security services. The lack of authentication increases the attack surface, particularly if the Job Service is exposed to less secure network segments. While no known exploits exist yet, the vulnerability's nature suggests a high potential for abuse if weaponized. This could lead to data tampering, denial of service, or unauthorized access to sensitive geospatial information.
Mitigation Recommendations
Organizations should immediately review their SOCET GXP deployments to identify if the Job Service is exposed to untrusted networks and restrict access accordingly using network segmentation and firewall rules. Until a patch is available, disable or isolate the Job Service if feasible to prevent unauthorized job submissions. Implement strict access controls and monitoring on systems running SOCET GXP to detect anomalous job submissions or privilege escalations. Employ host-based intrusion detection systems to alert on suspicious activity related to the Job Service. Coordinate with BAE Systems for timely updates and apply patches as soon as they are released. Conduct thorough audits of user permissions and ensure that local users do not have unnecessary privileges that could be exploited. Additionally, consider deploying application-layer authentication proxies or VPNs to enforce authentication around the Job Service. Regularly review logs for unauthorized job submissions and investigate any anomalies promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffa364ba6dffc5e202ccd8
Added to database: 10/27/2025, 4:52:52 PM
Last enriched: 10/27/2025, 5:09:27 PM
Last updated: 10/30/2025, 2:45:58 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43939: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection' in Dell Unity
HighCVE-2025-5347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
MediumCVE-2025-5343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
MediumCVE-2025-43942: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell Unity
HighCVE-2025-5342: CWE-400 Uncontrolled Resource Consumption in Zohocorp ManageEngine Exchange Reporter Plus
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.