Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58435: CWE-262: Not Using Password Aging in OSC ondemand

0
Medium
VulnerabilityCVE-2025-58435cvecve-2025-58435cwe-262
Published: Tue Sep 09 2025 (09/09/2025, 19:43:47 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:06:05 UTC

Technical Analysis

CVE-2025-58435 is a medium-severity vulnerability affecting Open OnDemand (OOD), an open-source high-performance computing (HPC) portal widely used to provide web-based access to HPC resources. The vulnerability arises from improper password rotation in the noVNC interactive applications component when used with TurboVNC versions higher than 3.1.2. Specifically, prior to OOD versions 3.1.15 and 4.0.7, the system failed to correctly rotate session passwords, which are critical for securing remote desktop sessions. This flaw is categorized under CWE-262, indicating a failure to implement password aging or rotation mechanisms. Exploitation requires that an attacker obtain the link to an active desktop session and be authenticated to the OOD portal. If these conditions are met, the attacker can reuse the session password to impersonate the original user, gaining full access to their desktop session and any data or actions therein. The vulnerability does not require local system access but does require portal authentication and user interaction (sharing of session links). The issue has been addressed in OOD versions 3.1.15 and 4.0.7 by implementing proper password rotation for all TurboVNC versions. As a temporary mitigation, downgrading TurboVNC to versions below 3.1.2 can prevent exploitation. The CVSS 4.0 score is 4.1 (medium), reflecting the need for authentication and user interaction, but also the high impact on confidentiality and integrity if exploited.

Potential Impact

For European organizations utilizing Open OnDemand for HPC access, this vulnerability poses a risk of unauthorized session hijacking and data exposure. HPC environments often handle sensitive research data, intellectual property, or critical infrastructure simulations. An attacker who gains access to an active desktop session could manipulate computations, exfiltrate data, or disrupt workflows, potentially causing operational and reputational damage. The requirement for portal authentication and link sharing reduces the likelihood of widespread exploitation but insider threats or compromised credentials could facilitate attacks. Additionally, organizations with collaborative HPC projects may inadvertently share session links, increasing risk. The impact on confidentiality and integrity is high, as attackers can perform any action as the original user. Availability impact is minimal as the vulnerability does not directly cause denial of service. Overall, the threat is significant for European research institutions, universities, and enterprises relying on HPC portals for sensitive workloads.

Mitigation Recommendations

1. Upgrade Open OnDemand installations to versions 3.1.15 or 4.0.7 (or later) immediately to ensure proper password rotation is enforced regardless of TurboVNC version. 2. If upgrading OOD is not immediately feasible, downgrade TurboVNC to versions below 3.1.2 as a temporary workaround to prevent password reuse. 3. Enforce strict access controls and monitoring on the OOD portal to detect unusual session sharing or multiple logins from the same session link. 4. Educate users on the risks of sharing active session links and implement policies to minimize link sharing. 5. Implement multi-factor authentication (MFA) on the OOD portal to reduce the risk of unauthorized authentication. 6. Regularly audit session logs and monitor for anomalous activities indicative of session hijacking. 7. Consider network segmentation and VPN usage to restrict access to the OOD portal to trusted networks and users. 8. Coordinate with HPC administrators to review and harden the overall security posture of the HPC environment, including VNC session management and password policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0859d840cb93c117a091d

Added to database: 9/9/2025, 7:53:01 PM

Last enriched: 9/17/2025, 1:06:05 AM

Last updated: 10/30/2025, 2:10:05 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats