CVE-2025-58435: CWE-262: Not Using Password Aging in OSC ondemand
Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2.
AI Analysis
Technical Summary
CVE-2025-58435 is a medium-severity vulnerability affecting Open OnDemand (OOD), an open-source high-performance computing (HPC) portal widely used to provide web-based access to HPC resources. The vulnerability arises from improper password rotation in the noVNC interactive applications component when used with TurboVNC versions higher than 3.1.2. Specifically, prior to OOD versions 3.1.15 and 4.0.7, the system failed to correctly rotate session passwords, which are critical for securing remote desktop sessions. This flaw is categorized under CWE-262, indicating a failure to implement password aging or rotation mechanisms. Exploitation requires that an attacker obtain the link to an active desktop session and be authenticated to the OOD portal. If these conditions are met, the attacker can reuse the session password to impersonate the original user, gaining full access to their desktop session and any data or actions therein. The vulnerability does not require local system access but does require portal authentication and user interaction (sharing of session links). The issue has been addressed in OOD versions 3.1.15 and 4.0.7 by implementing proper password rotation for all TurboVNC versions. As a temporary mitigation, downgrading TurboVNC to versions below 3.1.2 can prevent exploitation. The CVSS 4.0 score is 4.1 (medium), reflecting the need for authentication and user interaction, but also the high impact on confidentiality and integrity if exploited.
Potential Impact
For European organizations utilizing Open OnDemand for HPC access, this vulnerability poses a risk of unauthorized session hijacking and data exposure. HPC environments often handle sensitive research data, intellectual property, or critical infrastructure simulations. An attacker who gains access to an active desktop session could manipulate computations, exfiltrate data, or disrupt workflows, potentially causing operational and reputational damage. The requirement for portal authentication and link sharing reduces the likelihood of widespread exploitation but insider threats or compromised credentials could facilitate attacks. Additionally, organizations with collaborative HPC projects may inadvertently share session links, increasing risk. The impact on confidentiality and integrity is high, as attackers can perform any action as the original user. Availability impact is minimal as the vulnerability does not directly cause denial of service. Overall, the threat is significant for European research institutions, universities, and enterprises relying on HPC portals for sensitive workloads.
Mitigation Recommendations
1. Upgrade Open OnDemand installations to versions 3.1.15 or 4.0.7 (or later) immediately to ensure proper password rotation is enforced regardless of TurboVNC version. 2. If upgrading OOD is not immediately feasible, downgrade TurboVNC to versions below 3.1.2 as a temporary workaround to prevent password reuse. 3. Enforce strict access controls and monitoring on the OOD portal to detect unusual session sharing or multiple logins from the same session link. 4. Educate users on the risks of sharing active session links and implement policies to minimize link sharing. 5. Implement multi-factor authentication (MFA) on the OOD portal to reduce the risk of unauthorized authentication. 6. Regularly audit session logs and monitor for anomalous activities indicative of session hijacking. 7. Consider network segmentation and VPN usage to restrict access to the OOD portal to trusted networks and users. 8. Coordinate with HPC administrators to review and harden the overall security posture of the HPC environment, including VNC session management and password policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy, Spain, Belgium, Finland
CVE-2025-58435: CWE-262: Not Using Password Aging in OSC ondemand
Description
Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-58435 is a medium-severity vulnerability affecting Open OnDemand (OOD), an open-source high-performance computing (HPC) portal widely used to provide web-based access to HPC resources. The vulnerability arises from improper password rotation in the noVNC interactive applications component when used with TurboVNC versions higher than 3.1.2. Specifically, prior to OOD versions 3.1.15 and 4.0.7, the system failed to correctly rotate session passwords, which are critical for securing remote desktop sessions. This flaw is categorized under CWE-262, indicating a failure to implement password aging or rotation mechanisms. Exploitation requires that an attacker obtain the link to an active desktop session and be authenticated to the OOD portal. If these conditions are met, the attacker can reuse the session password to impersonate the original user, gaining full access to their desktop session and any data or actions therein. The vulnerability does not require local system access but does require portal authentication and user interaction (sharing of session links). The issue has been addressed in OOD versions 3.1.15 and 4.0.7 by implementing proper password rotation for all TurboVNC versions. As a temporary mitigation, downgrading TurboVNC to versions below 3.1.2 can prevent exploitation. The CVSS 4.0 score is 4.1 (medium), reflecting the need for authentication and user interaction, but also the high impact on confidentiality and integrity if exploited.
Potential Impact
For European organizations utilizing Open OnDemand for HPC access, this vulnerability poses a risk of unauthorized session hijacking and data exposure. HPC environments often handle sensitive research data, intellectual property, or critical infrastructure simulations. An attacker who gains access to an active desktop session could manipulate computations, exfiltrate data, or disrupt workflows, potentially causing operational and reputational damage. The requirement for portal authentication and link sharing reduces the likelihood of widespread exploitation but insider threats or compromised credentials could facilitate attacks. Additionally, organizations with collaborative HPC projects may inadvertently share session links, increasing risk. The impact on confidentiality and integrity is high, as attackers can perform any action as the original user. Availability impact is minimal as the vulnerability does not directly cause denial of service. Overall, the threat is significant for European research institutions, universities, and enterprises relying on HPC portals for sensitive workloads.
Mitigation Recommendations
1. Upgrade Open OnDemand installations to versions 3.1.15 or 4.0.7 (or later) immediately to ensure proper password rotation is enforced regardless of TurboVNC version. 2. If upgrading OOD is not immediately feasible, downgrade TurboVNC to versions below 3.1.2 as a temporary workaround to prevent password reuse. 3. Enforce strict access controls and monitoring on the OOD portal to detect unusual session sharing or multiple logins from the same session link. 4. Educate users on the risks of sharing active session links and implement policies to minimize link sharing. 5. Implement multi-factor authentication (MFA) on the OOD portal to reduce the risk of unauthorized authentication. 6. Regularly audit session logs and monitor for anomalous activities indicative of session hijacking. 7. Consider network segmentation and VPN usage to restrict access to the OOD portal to trusted networks and users. 8. Coordinate with HPC administrators to review and harden the overall security posture of the HPC environment, including VNC session management and password policies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.532Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0859d840cb93c117a091d
Added to database: 9/9/2025, 7:53:01 PM
Last enriched: 9/17/2025, 1:06:05 AM
Last updated: 10/30/2025, 2:10:05 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighMajor US Telecom Backbone Firm Hacked by Nation-State Actors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.