Skip to main content

CVE-2025-58435: CWE-262: Not Using Password Aging in OSC ondemand

Medium
VulnerabilityCVE-2025-58435cvecve-2025-58435cwe-262
Published: Tue Sep 09 2025 (09/09/2025, 19:43:47 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2.

AI-Powered Analysis

AILast updated: 09/09/2025, 19:53:17 UTC

Technical Analysis

CVE-2025-58435 is a medium severity vulnerability affecting Open OnDemand (OSC ondemand), an open-source portal widely used for high-performance computing (HPC) environments. The vulnerability arises from improper password rotation in noVNC interactive applications when used with TurboVNC versions higher than 3.1.2. Specifically, prior to Open OnDemand versions 3.1.15 and 4.0.7, the system failed to rotate passwords correctly, allowing a user who obtains a link to an active desktop session to reuse the session credentials without password expiration. This flaw is classified under CWE-262, which relates to the failure to implement password aging or rotation mechanisms. Exploitation requires that an attacker first obtain the session link and be authenticated to the portal, which lowers the likelihood of exploitation. However, if exploited, the attacker can fully impersonate the original user, gaining access to their data and any actions permitted by their session. The vulnerability does not affect Open OnDemand versions 3.1.15 and later or 4.0.7 and later, where proper password rotation has been implemented regardless of TurboVNC version. As a temporary workaround, downgrading TurboVNC to versions below 3.1.2 mitigates the issue. The CVSS 4.0 base score is 4.1, reflecting a medium severity due to network attack vector, low attack complexity, partial authentication required, and user interaction needed, with high impact on confidentiality and integrity but no impact on availability.

Potential Impact

For European organizations utilizing Open OnDemand in HPC environments, this vulnerability poses a risk of unauthorized session hijacking if an attacker can obtain active session links and authenticate to the portal. The impact includes potential data exposure, unauthorized data manipulation, and misuse of HPC resources under the compromised user’s identity. Given the collaborative nature of HPC portals, where multiple users may share access or links, the risk of accidental or malicious link sharing increases. This could lead to insider threats or lateral movement within HPC infrastructures. The vulnerability does not directly allow unauthenticated remote exploitation, limiting its impact to users with some level of portal access. However, the confidentiality and integrity of sensitive computational data and research could be compromised, which is critical for academic, governmental, and industrial HPC users in Europe. The medium severity rating suggests that while the threat is not critical, it requires timely patching to prevent potential exploitation, especially in environments with high-value data or strict compliance requirements.

Mitigation Recommendations

European organizations should prioritize upgrading Open OnDemand to versions 3.1.15 or 4.0.7 and later to ensure proper password rotation is enforced. Until upgrades can be applied, organizations should consider downgrading TurboVNC to versions below 3.1.2 as a temporary mitigation. Additionally, organizations should enforce strict access controls and monitoring on session link sharing, including educating users about the risks of sharing active session URLs. Implementing multi-factor authentication (MFA) on the portal can reduce the risk of unauthorized access even if links are leaked. Logging and alerting on unusual session activities or multiple concurrent sessions from different IP addresses can help detect potential misuse. Regular audits of user sessions and periodic password resets for portal accounts can further reduce risk. Network segmentation of HPC portals and limiting portal access to trusted networks or VPNs can also reduce exposure. Finally, organizations should review and update their incident response plans to include scenarios involving session hijacking in HPC environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0859d840cb93c117a091d

Added to database: 9/9/2025, 7:53:01 PM

Last enriched: 9/9/2025, 7:53:17 PM

Last updated: 9/9/2025, 7:53:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats