Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59270: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in pspete psPAS

0
Low
VulnerabilityCVE-2025-59270cvecve-2025-59270cwe-757
Published: Tue Sep 16 2025 (09/16/2025, 14:41:06 UTC)
Source: CVE Database V5
Vendor/Project: pspete
Product: psPAS

Description

psPAS PowerShell module does not explicitly enforce TLS 1.2 within the 'Get-PASSAMLResponse' function during the SAML authentication process. An unauthenticated attacker in a 'Man-in-the-Middle' position could manipulate the TLS handshake and downgrade TLS to a deprecated protocol. Fixed in 7.0.209.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:19:37 UTC

Technical Analysis

CVE-2025-59270 is a vulnerability identified in the psPAS PowerShell module developed by pspete, specifically affecting version 6.4.85. The issue arises in the 'Get-PASSAMLResponse' function, which handles SAML authentication. This function does not explicitly enforce the use of TLS 1.2 or higher during the TLS handshake process. As a result, an unauthenticated attacker positioned as a Man-in-the-Middle (MitM) can manipulate the TLS negotiation to downgrade the connection to a less secure, deprecated protocol version (e.g., TLS 1.0 or 1.1). This algorithm downgrade attack (CWE-757) weakens the cryptographic protections of the session, potentially exposing sensitive authentication tokens or session data to interception or tampering. However, the vulnerability does not directly allow for integrity or availability compromise, nor does it require user interaction or authentication to exploit. The vendor has addressed this issue in version 7.0.209 by enforcing TLS 1.2 or higher during the handshake, mitigating the downgrade risk. The CVSS v3.1 base score is 3.1, reflecting a low severity primarily due to the complexity of attack (high attack complexity) and limited impact (confidentiality impact only, no integrity or availability impact). No known exploits are currently reported in the wild.

Potential Impact

For European organizations, this vulnerability poses a moderate confidentiality risk during the SAML authentication process when using the affected psPAS module version. Since psPAS is a PowerShell module used for privileged access management and automation, interception of authentication tokens or session data could lead to unauthorized access if attackers successfully downgrade TLS and capture sensitive information. However, the low CVSS score and absence of known exploits suggest limited immediate risk. Organizations relying on psPAS for critical identity and access management workflows may face increased exposure to MitM attacks on internal networks or less secure environments where TLS downgrade is feasible. The impact is more pronounced in sectors with stringent compliance requirements for secure authentication, such as finance, healthcare, and government. The vulnerability does not affect integrity or availability directly but could facilitate further attacks if attackers obtain authentication credentials or tokens.

Mitigation Recommendations

European organizations should upgrade psPAS to version 7.0.209 or later, where TLS 1.2 enforcement is implemented to prevent downgrade attacks. Until upgrade, network-level mitigations include enforcing strict TLS policies on endpoints and network devices, disabling deprecated TLS versions (1.0 and 1.1) across the environment, and deploying TLS inspection tools to detect downgrade attempts. Additionally, organizations should monitor network traffic for unusual TLS negotiation patterns indicative of MitM attacks. Employing network segmentation and zero-trust principles can limit exposure of authentication traffic to untrusted networks. Regularly auditing PowerShell modules and scripts for outdated dependencies and enforcing secure coding practices around authentication workflows will reduce similar risks. Finally, educating security teams about the risks of algorithm downgrade attacks and ensuring incident response plans include TLS-related attack scenarios will improve preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-09-11T19:17:13.881Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c978667303a81d6bf89e1c

Added to database: 9/16/2025, 2:47:02 PM

Last enriched: 10/1/2025, 12:19:37 AM

Last updated: 10/31/2025, 10:35:51 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats