CVE-2025-59683: CWE-863 Incorrect Authorization in Pexip Infinity
Pexip Infinity 15.0 through 38.0 before 38.1 has Improper Access Control in the Secure Scheduler for Exchange service, when used with Office 365 Legacy Exchange Tokens. This allows a remote attacker to read potentially sensitive data and excessively consume resources, leading to a denial of service.
AI Analysis
Technical Summary
CVE-2025-59683 identifies an improper authorization vulnerability (CWE-863) in Pexip Infinity's Secure Scheduler for Exchange service, specifically when integrated with Office 365 Legacy Exchange Tokens. The affected versions range from 15.0 through 38.0 before 38.1. The flaw arises because the service does not correctly enforce access control policies, allowing remote attackers to bypass authorization checks. This enables attackers to read sensitive scheduling data that should be protected and to excessively consume system resources, potentially causing denial of service (DoS). The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score of 8.2 reflects the high impact on availability and moderate impact on confidentiality, with low attack complexity and no prerequisites. Although no public exploits have been reported, the vulnerability's nature and ease of exploitation make it a critical concern for organizations using Pexip Infinity integrated with legacy Office 365 tokens. The root cause is the incorrect implementation of authorization logic in the Secure Scheduler component, which fails to validate whether the requesting entity has the appropriate permissions to access or manipulate scheduling data. This can lead to unauthorized data disclosure and resource exhaustion, disrupting service availability.
Potential Impact
For European organizations, the impact of CVE-2025-59683 can be significant, particularly for those relying on Pexip Infinity for video conferencing and scheduling integrated with Office 365 environments. Unauthorized access to scheduling data could expose sensitive meeting details, participant information, and internal communications, potentially leading to privacy violations and information leakage. The denial of service aspect could disrupt critical communication infrastructure, affecting business continuity and operational efficiency. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where secure communications are paramount, may face heightened risks. Additionally, the exploitation of this vulnerability could be leveraged as part of broader attack campaigns targeting collaboration platforms. The lack of authentication requirements and ease of exploitation increase the likelihood of attacks, potentially impacting a wide range of organizations across Europe. Resource exhaustion attacks could degrade service performance or cause outages, impacting user productivity and trust in the platform.
Mitigation Recommendations
To mitigate CVE-2025-59683, organizations should immediately upgrade Pexip Infinity to version 38.1 or later, where the vulnerability has been addressed. If upgrading is not immediately feasible, organizations should disable or restrict the use of the Secure Scheduler for Exchange service, especially when using Office 365 Legacy Exchange Tokens. Reviewing and phasing out legacy token usage in favor of modern authentication mechanisms (e.g., OAuth 2.0) can reduce exposure. Network-level controls such as IP whitelisting and segmentation can limit access to the affected service. Implementing strict monitoring and alerting for unusual resource consumption or unauthorized access attempts on the scheduler service is recommended. Additionally, organizations should audit their scheduling data access logs to detect potential unauthorized activities. Coordinating with Pexip support and following vendor advisories will ensure timely application of patches and best practices. Finally, educating IT and security teams about this vulnerability and its exploitation vectors will enhance preparedness and response capabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Denmark, Finland, Belgium, Switzerland
CVE-2025-59683: CWE-863 Incorrect Authorization in Pexip Infinity
Description
Pexip Infinity 15.0 through 38.0 before 38.1 has Improper Access Control in the Secure Scheduler for Exchange service, when used with Office 365 Legacy Exchange Tokens. This allows a remote attacker to read potentially sensitive data and excessively consume resources, leading to a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-59683 identifies an improper authorization vulnerability (CWE-863) in Pexip Infinity's Secure Scheduler for Exchange service, specifically when integrated with Office 365 Legacy Exchange Tokens. The affected versions range from 15.0 through 38.0 before 38.1. The flaw arises because the service does not correctly enforce access control policies, allowing remote attackers to bypass authorization checks. This enables attackers to read sensitive scheduling data that should be protected and to excessively consume system resources, potentially causing denial of service (DoS). The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score of 8.2 reflects the high impact on availability and moderate impact on confidentiality, with low attack complexity and no prerequisites. Although no public exploits have been reported, the vulnerability's nature and ease of exploitation make it a critical concern for organizations using Pexip Infinity integrated with legacy Office 365 tokens. The root cause is the incorrect implementation of authorization logic in the Secure Scheduler component, which fails to validate whether the requesting entity has the appropriate permissions to access or manipulate scheduling data. This can lead to unauthorized data disclosure and resource exhaustion, disrupting service availability.
Potential Impact
For European organizations, the impact of CVE-2025-59683 can be significant, particularly for those relying on Pexip Infinity for video conferencing and scheduling integrated with Office 365 environments. Unauthorized access to scheduling data could expose sensitive meeting details, participant information, and internal communications, potentially leading to privacy violations and information leakage. The denial of service aspect could disrupt critical communication infrastructure, affecting business continuity and operational efficiency. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where secure communications are paramount, may face heightened risks. Additionally, the exploitation of this vulnerability could be leveraged as part of broader attack campaigns targeting collaboration platforms. The lack of authentication requirements and ease of exploitation increase the likelihood of attacks, potentially impacting a wide range of organizations across Europe. Resource exhaustion attacks could degrade service performance or cause outages, impacting user productivity and trust in the platform.
Mitigation Recommendations
To mitigate CVE-2025-59683, organizations should immediately upgrade Pexip Infinity to version 38.1 or later, where the vulnerability has been addressed. If upgrading is not immediately feasible, organizations should disable or restrict the use of the Secure Scheduler for Exchange service, especially when using Office 365 Legacy Exchange Tokens. Reviewing and phasing out legacy token usage in favor of modern authentication mechanisms (e.g., OAuth 2.0) can reduce exposure. Network-level controls such as IP whitelisting and segmentation can limit access to the affected service. Implementing strict monitoring and alerting for unusual resource consumption or unauthorized access attempts on the scheduler service is recommended. Additionally, organizations should audit their scheduling data access logs to detect potential unauthorized activities. Coordinating with Pexip support and following vendor advisories will ensure timely application of patches and best practices. Finally, educating IT and security teams about this vulnerability and its exploitation vectors will enhance preparedness and response capabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694cc81abddd8c7d7f664833
Added to database: 12/25/2025, 5:14:02 AM
Last enriched: 12/25/2025, 5:14:30 AM
Last updated: 12/25/2025, 8:24:54 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66378: CWE-863 Incorrect Authorization in Pexip Infinity
MediumCVE-2025-66377: CWE-306 Missing Authentication for Critical Function in Pexip Infinity
HighCVE-2025-48704: CWE-617 Reachable Assertion in Pexip Infinity
HighCVE-2025-15078: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-66443: CWE-617 Reachable Assertion in Pexip Infinity
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.