Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO

0
Medium
VulnerabilityCVE-2025-58079cvecve-2025-58079
Published: Thu Oct 16 2025 (10/16/2025, 10:03:35 UTC)
Source: CVE Database V5
Vendor/Project: NEOJAPAN Inc.
Product: desknet's NEO

Description

CVE-2025-58079 is a medium severity vulnerability affecting NEOJAPAN Inc. 's desknet's NEO versions V4. 0R1. 0 through V9. 0R2. 0. It involves improper protection of alternate paths in the AppSuite component, allowing an attacker with limited privileges to create malicious AppSuite applications. The vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact confidentiality or availability, it can lead to integrity compromise by enabling unauthorized application creation. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 10/16/2025, 10:29:16 UTC

Technical Analysis

CVE-2025-58079 is a vulnerability categorized under improper protection of alternate paths (CWE-424) found in the AppSuite component of desknet's NEO, a collaborative groupware platform developed by NEOJAPAN Inc. This vulnerability affects versions from V4.0R1.0 up to V9.0R2.0. The flaw allows an attacker with limited privileges (PR:L) to create malicious AppSuite applications by exploiting insufficient validation or protection of alternate file paths within the application. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), and the scope remains unchanged (S:U). The CVSS v3.0 base score is 4.3, indicating medium severity, primarily due to the impact on integrity (I:L) without affecting confidentiality or availability. The vulnerability could enable an attacker to introduce unauthorized applications into the AppSuite environment, potentially leading to unauthorized code execution or manipulation of business processes managed via desknet's NEO. Although no known exploits are reported in the wild, the vulnerability's presence in multiple versions spanning several years suggests a broad attack surface. The lack of patch links indicates that either patches are pending or not publicly disclosed yet. The vulnerability was reserved in early September 2025 and published in mid-October 2025 by JPCERT, indicating recent discovery and disclosure.

Potential Impact

For European organizations using desknet's NEO, this vulnerability poses a risk to the integrity of their collaborative platforms. Attackers exploiting this flaw could introduce malicious applications within the AppSuite, potentially leading to unauthorized actions, data manipulation, or disruption of workflows. While confidentiality and availability are not directly impacted, the integrity compromise could undermine trust in business processes and lead to indirect operational impacts. Organizations in sectors relying heavily on desknet's NEO for internal communication and project management—such as government agencies, large enterprises, and educational institutions—may face increased risk. The medium severity score reflects that exploitation requires some privileges, limiting the threat to insiders or attackers who have already gained limited access. However, the network attack vector means that remote exploitation is possible once limited access is obtained, increasing the risk profile. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop exploit code. European entities with strategic or sensitive operations using desknet's NEO should prioritize assessment and mitigation to prevent potential integrity breaches.

Mitigation Recommendations

1. Restrict privileges rigorously: Limit the ability to create or modify AppSuite applications to trusted administrators only, minimizing the risk of exploitation by low-privilege users. 2. Monitor AppSuite application creation and changes: Implement logging and alerting on creation or modification of AppSuite applications to detect suspicious activities early. 3. Apply vendor patches promptly: Stay in close contact with NEOJAPAN Inc. for updates or patches addressing CVE-2025-58079 and deploy them as soon as they become available. 4. Conduct internal audits: Regularly review user permissions and application configurations within desknet's NEO to ensure no unauthorized applications exist. 5. Network segmentation: Isolate desknet's NEO servers within secure network zones to reduce exposure to unauthorized network access. 6. Employ endpoint protection: Use endpoint detection and response (EDR) tools to detect anomalous behaviors related to application creation or execution. 7. User training: Educate users about the risks of privilege misuse and encourage reporting of unusual system behavior. 8. Incident response readiness: Prepare procedures to respond quickly if exploitation is detected, including containment and forensic analysis.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-09-01T11:21:48.364Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f0c5669f8a5dbaeac6c23d

Added to database: 10/16/2025, 10:13:58 AM

Last enriched: 10/16/2025, 10:29:16 AM

Last updated: 10/16/2025, 1:40:22 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats