CVE-2025-54970: n/a
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service fails to authenticate requests. In some configurations, this may allow remote or local users to abort jobs or read information without the permissions of the job owner.
AI Analysis
Technical Summary
CVE-2025-54970 is a vulnerability identified in BAE Systems' SOCET GXP software, a geospatial analysis tool widely used in defense and intelligence sectors. The flaw exists in the Job Status Service component prior to version 4.6.0.2, where it fails to authenticate requests properly. This improper authentication allows users with limited privileges—either local or remote—to perform unauthorized actions such as aborting active jobs or reading job information that they do not own. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce correct permission checks. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). Although no public exploits are currently known, the vulnerability poses a risk of sensitive data exposure and operational disruption within affected environments. The lack of authentication on the Job Status Service could be exploited by insiders or attackers who have gained limited access to the network, enabling them to interfere with job processing or extract sensitive information. No patches were available at the time of disclosure, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, particularly those in defense, intelligence, and geospatial analysis, this vulnerability could lead to unauthorized disclosure of sensitive operational data, undermining confidentiality. The ability to abort jobs without proper authorization could disrupt critical workflows, potentially delaying mission-critical analyses or decisions. Although the vulnerability does not directly impact data integrity or system availability, the exposure of sensitive job information could facilitate further attacks or intelligence gathering by adversaries. Given the strategic importance of geospatial intelligence in European security contexts, exploitation could have national security implications. Organizations relying on SOCET GXP in countries with advanced defense sectors or active intelligence operations are at heightened risk. The requirement for limited privileges means that insider threats or attackers who have breached perimeter defenses could exploit this vulnerability, increasing the threat landscape. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Apply official patches from BAE Systems as soon as they become available to address the authentication flaw in the Job Status Service. 2. Until patches are released, restrict network access to the Job Status Service using firewalls and network segmentation, limiting exposure to trusted users and systems only. 3. Implement strict access controls and monitoring on SOCET GXP environments to detect unauthorized job abort attempts or unusual access patterns. 4. Enforce the principle of least privilege for all users interacting with SOCET GXP, minimizing the number of users with any level of privilege that could be leveraged. 5. Conduct regular audits of job status logs and access records to identify potential misuse or exploitation attempts. 6. Employ intrusion detection systems (IDS) tuned to detect anomalous activity related to job management services. 7. Educate users and administrators about the risks associated with this vulnerability and encourage prompt reporting of suspicious behavior. 8. Consider isolating SOCET GXP systems from general corporate networks to reduce the attack surface.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Netherlands
CVE-2025-54970: n/a
Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service fails to authenticate requests. In some configurations, this may allow remote or local users to abort jobs or read information without the permissions of the job owner.
AI-Powered Analysis
Technical Analysis
CVE-2025-54970 is a vulnerability identified in BAE Systems' SOCET GXP software, a geospatial analysis tool widely used in defense and intelligence sectors. The flaw exists in the Job Status Service component prior to version 4.6.0.2, where it fails to authenticate requests properly. This improper authentication allows users with limited privileges—either local or remote—to perform unauthorized actions such as aborting active jobs or reading job information that they do not own. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce correct permission checks. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). Although no public exploits are currently known, the vulnerability poses a risk of sensitive data exposure and operational disruption within affected environments. The lack of authentication on the Job Status Service could be exploited by insiders or attackers who have gained limited access to the network, enabling them to interfere with job processing or extract sensitive information. No patches were available at the time of disclosure, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, particularly those in defense, intelligence, and geospatial analysis, this vulnerability could lead to unauthorized disclosure of sensitive operational data, undermining confidentiality. The ability to abort jobs without proper authorization could disrupt critical workflows, potentially delaying mission-critical analyses or decisions. Although the vulnerability does not directly impact data integrity or system availability, the exposure of sensitive job information could facilitate further attacks or intelligence gathering by adversaries. Given the strategic importance of geospatial intelligence in European security contexts, exploitation could have national security implications. Organizations relying on SOCET GXP in countries with advanced defense sectors or active intelligence operations are at heightened risk. The requirement for limited privileges means that insider threats or attackers who have breached perimeter defenses could exploit this vulnerability, increasing the threat landscape. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Apply official patches from BAE Systems as soon as they become available to address the authentication flaw in the Job Status Service. 2. Until patches are released, restrict network access to the Job Status Service using firewalls and network segmentation, limiting exposure to trusted users and systems only. 3. Implement strict access controls and monitoring on SOCET GXP environments to detect unauthorized job abort attempts or unusual access patterns. 4. Enforce the principle of least privilege for all users interacting with SOCET GXP, minimizing the number of users with any level of privilege that could be leveraged. 5. Conduct regular audits of job status logs and access records to identify potential misuse or exploitation attempts. 6. Employ intrusion detection systems (IDS) tuned to detect anomalous activity related to job management services. 7. Educate users and administrators about the risks associated with this vulnerability and encourage prompt reporting of suspicious behavior. 8. Consider isolating SOCET GXP systems from general corporate networks to reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffa364ba6dffc5e202ccfe
Added to database: 10/27/2025, 4:52:52 PM
Last enriched: 11/3/2025, 5:47:44 PM
Last updated: 12/14/2025, 6:36:14 AM
Views: 149
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14646: SQL Injection in code-projects Student File Management System
MediumCVE-2025-12696: CWE-862 Missing Authorization in HelloLeads CRM Form Shortcode
HighCVE-2025-14645: SQL Injection in code-projects Student File Management System
MediumCVE-2025-12537: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpvibes Addon Elements for Elementor (formerly Elementor Addon Elements)
MediumCVE-2025-67897: CWE-195 Signed to Unsigned Conversion Error in sequoia-pgp sequoia
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.