Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62181: CWE-204: Observable Response Discrepancy in Pegasystems Pega Infinity

0
Medium
VulnerabilityCVE-2025-62181cvecve-2025-62181cwe-204
Published: Wed Dec 10 2025 (12/10/2025, 20:41:08 UTC)
Source: CVE Database V5
Vendor/Project: Pegasystems
Product: Pega Infinity

Description

Pega Platform versions 7.1.0 through Infinity 25.1.0 are affected by a User Enumeration. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not. This only applies to deprecated basic-authentication feature and other more secure authentication mechanisms are recommended. A fix is being provided in the 24.1.4, 24.2.4, and 25.1.1 patch releases. Please note: Basic credentials authentication service type is deprecated started in 24.2 version: https://docs.pega.com/bundle/platform/page/platform/release-notes/security/whats-new-security-242.html.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:07:46 UTC

Technical Analysis

CVE-2025-62181 is a vulnerability classified under CWE-204 (Observable Response Discrepancy) affecting Pegasystems Pega Infinity versions 7.1.0 through 25.1.0. The flaw arises during the user authentication process when the deprecated basic-authentication feature is in use. Specifically, the system exhibits measurable differences in response times depending on whether a username exists or not. This timing discrepancy allows a remote, unauthenticated attacker to perform user enumeration by systematically probing usernames and analyzing response delays. User enumeration can be a precursor to more severe attacks such as brute force password attempts or social engineering. The vulnerability does not require any user interaction or authentication, making it accessible to any remote attacker. The issue is mitigated by using more secure authentication mechanisms, as basic authentication is deprecated starting with version 24.2. Pegasystems has addressed this vulnerability in patch releases 24.1.4, 24.2.4, and 25.1.1. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the limited impact on confidentiality (only username disclosure), no impact on integrity or availability, and ease of exploitation without privileges or user interaction.

Potential Impact

For European organizations, the primary impact of CVE-2025-62181 is the potential disclosure of valid usernames through timing analysis during authentication attempts. While this does not directly compromise passwords or system integrity, it significantly aids attackers in crafting targeted attacks such as credential stuffing, phishing, or brute force password guessing. Organizations relying on Pega Infinity with basic authentication enabled may see increased risk of account compromise, especially if usernames are sensitive or linked to privileged accounts. This vulnerability could also facilitate reconnaissance efforts against critical infrastructure or sensitive business applications built on Pega Infinity. The impact is heightened in sectors where user identity confidentiality is critical, such as finance, healthcare, and government services. However, the absence of known exploits and the availability of patches reduce the immediate risk if organizations apply recommended updates and migrate away from basic authentication.

Mitigation Recommendations

European organizations should prioritize upgrading Pega Infinity to the patched versions 24.1.4, 24.2.4, or 25.1.1 to remediate this vulnerability. If immediate upgrading is not feasible, disabling the deprecated basic-authentication feature is critical to prevent exploitation. Organizations should enforce the use of more secure authentication mechanisms supported by Pega Infinity, such as OAuth, SAML, or multi-factor authentication (MFA), to eliminate timing discrepancies exploitable by attackers. Additionally, implementing rate limiting and monitoring authentication endpoints for anomalous request patterns can help detect and mitigate user enumeration attempts. Security teams should audit their Pega Infinity deployments to identify any legacy configurations still using basic authentication and remediate accordingly. Finally, educating users about phishing risks and enforcing strong password policies will reduce the likelihood of successful attacks leveraging enumerated usernames.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Pega
Date Reserved
2025-10-07T19:04:27.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939dce9a97935729e774028

Added to database: 12/10/2025, 8:49:45 PM

Last enriched: 12/10/2025, 9:07:46 PM

Last updated: 12/11/2025, 7:26:05 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats