CVE-2025-54968: n/a
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
AI Analysis
Technical Summary
CVE-2025-54968 is a vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial analysis and imagery exploitation tool widely used in defense and intelligence sectors. The vulnerability arises because the SOCET GXP Job Service does not enforce authentication, allowing unauthorized users to submit jobs remotely or locally. In some configurations, these jobs execute with the permissions of other users, potentially including privileged accounts. This lack of authentication (CWE-284) means an attacker with network access can submit arbitrary jobs, leading to unauthorized code execution, data manipulation, or service disruption. The CVSS 3.1 base score of 8.8 reflects the network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known yet, the vulnerability's characteristics make it a critical risk for organizations relying on SOCET GXP for sensitive geospatial data processing. The issue underscores the importance of proper authentication mechanisms in job submission services to prevent privilege escalation and unauthorized access.
Potential Impact
For European organizations, especially those in defense, intelligence, and critical infrastructure sectors, this vulnerability poses a significant risk. SOCET GXP is used for geospatial intelligence and imagery analysis, often involving sensitive or classified data. Exploitation could lead to unauthorized access to sensitive geospatial data, manipulation or destruction of critical intelligence, and disruption of operational workflows. The ability to execute jobs with other users' permissions could allow attackers to escalate privileges, move laterally within networks, and potentially compromise entire systems. This could undermine national security operations, intelligence gathering, and critical decision-making processes. Additionally, the disruption or manipulation of geospatial data could impact emergency response, border security, and infrastructure management. The lack of authentication increases the attack surface, making remote exploitation feasible without user interaction, thus raising the urgency for mitigation in European contexts where SOCET GXP is deployed.
Mitigation Recommendations
1. Upgrade SOCET GXP to version 4.6.0.2 or later where the authentication issue is resolved. 2. Restrict network access to the SOCET GXP Job Service by implementing network segmentation and firewall rules to limit access only to trusted hosts and users. 3. Implement strict access control policies and monitor job submissions for unusual activity or unauthorized access attempts. 4. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous job submission patterns. 5. Conduct regular audits of user permissions and job execution logs to identify potential misuse. 6. Where possible, isolate SOCET GXP environments handling sensitive data from general corporate networks to reduce exposure. 7. Educate system administrators and users about the risks of unauthenticated job submissions and enforce strong operational security practices. 8. Develop incident response plans specifically addressing potential exploitation of this vulnerability to ensure rapid containment and remediation.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands
CVE-2025-54968: n/a
Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
AI-Powered Analysis
Technical Analysis
CVE-2025-54968 is a vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial analysis and imagery exploitation tool widely used in defense and intelligence sectors. The vulnerability arises because the SOCET GXP Job Service does not enforce authentication, allowing unauthorized users to submit jobs remotely or locally. In some configurations, these jobs execute with the permissions of other users, potentially including privileged accounts. This lack of authentication (CWE-284) means an attacker with network access can submit arbitrary jobs, leading to unauthorized code execution, data manipulation, or service disruption. The CVSS 3.1 base score of 8.8 reflects the network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known yet, the vulnerability's characteristics make it a critical risk for organizations relying on SOCET GXP for sensitive geospatial data processing. The issue underscores the importance of proper authentication mechanisms in job submission services to prevent privilege escalation and unauthorized access.
Potential Impact
For European organizations, especially those in defense, intelligence, and critical infrastructure sectors, this vulnerability poses a significant risk. SOCET GXP is used for geospatial intelligence and imagery analysis, often involving sensitive or classified data. Exploitation could lead to unauthorized access to sensitive geospatial data, manipulation or destruction of critical intelligence, and disruption of operational workflows. The ability to execute jobs with other users' permissions could allow attackers to escalate privileges, move laterally within networks, and potentially compromise entire systems. This could undermine national security operations, intelligence gathering, and critical decision-making processes. Additionally, the disruption or manipulation of geospatial data could impact emergency response, border security, and infrastructure management. The lack of authentication increases the attack surface, making remote exploitation feasible without user interaction, thus raising the urgency for mitigation in European contexts where SOCET GXP is deployed.
Mitigation Recommendations
1. Upgrade SOCET GXP to version 4.6.0.2 or later where the authentication issue is resolved. 2. Restrict network access to the SOCET GXP Job Service by implementing network segmentation and firewall rules to limit access only to trusted hosts and users. 3. Implement strict access control policies and monitor job submissions for unusual activity or unauthorized access attempts. 4. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous job submission patterns. 5. Conduct regular audits of user permissions and job execution logs to identify potential misuse. 6. Where possible, isolate SOCET GXP environments handling sensitive data from general corporate networks to reduce exposure. 7. Educate system administrators and users about the risks of unauthenticated job submissions and enforce strong operational security practices. 8. Develop incident response plans specifically addressing potential exploitation of this vulnerability to ensure rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffa364ba6dffc5e202ccd8
Added to database: 10/27/2025, 4:52:52 PM
Last enriched: 11/3/2025, 5:47:25 PM
Last updated: 12/12/2025, 3:18:15 PM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58770: CWE-280: Improper Handling of Insufficient Permissions or Privileges in AMI AptioV
HighCVE-2025-36755: CWE-1244: Internal Asset Exposed to Unsafe Debug Access Level or State in CleverDisplay B.V. BlueOne (CleverDisplay Hardware Player)
LowCVE-2025-13506: CWE-250 Execution with Unnecessary Privileges in Nebim Neyir Computer Industry and Services Inc. Nebim V3 ERP
HighCVE-2025-14442: CWE-552 Files or Directories Accessible to External Parties in ays-pro Secure Copy Content Protection and Content Locking
MediumCVE-2025-14159: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Secure Copy Content Protection and Content Locking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.