Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62189: Incorrect authorization in LogStare Inc. LogStare Collector (for Windows)

0
Medium
VulnerabilityCVE-2025-62189cvecve-2025-62189
Published: Fri Nov 21 2025 (11/21/2025, 06:17:56 UTC)
Source: CVE Database V5
Vendor/Project: LogStare Inc.
Product: LogStare Collector (for Windows)

Description

LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.

AI-Powered Analysis

AILast updated: 11/21/2025, 06:53:45 UTC

Technical Analysis

CVE-2025-62189 is a security vulnerability identified in LogStare Collector for Windows, specifically affecting versions 2.4.1 and earlier. The flaw resides in the UserRegistration functionality, where improper authorization checks allow a non-administrative user to create new user accounts by sending specially crafted HTTP requests. This bypasses intended access controls, enabling unauthorized privilege escalation within the application environment. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have some level of existing privileges (non-administrative user). The impact primarily affects the integrity of the system by allowing unauthorized account creation, which could be leveraged for further attacks or persistence. The CVSS 3.0 base score of 4.3 reflects a medium severity, considering the attack vector is network-based, the attack complexity is low, privileges required are low, and no user interaction is needed. There is no direct impact on confidentiality or availability. No public exploits have been reported yet, and no patches are linked in the provided data, indicating that organizations should monitor vendor advisories closely. The vulnerability highlights the importance of strict authorization checks in user management components of security monitoring tools like LogStare Collector.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized creation of user accounts within LogStare Collector, potentially allowing attackers to escalate privileges or maintain persistence in security monitoring environments. This could undermine the integrity of log collection and analysis, leading to inaccurate or manipulated security data. Critical infrastructure operators and enterprises relying on LogStare for centralized log management could face increased risk of insider-like attacks or lateral movement within their networks. Although confidentiality and availability are not directly impacted, the integrity compromise could delay detection of malicious activities or facilitate stealthy attacks. The medium severity suggests that while the risk is not critical, it is significant enough to warrant prompt attention, especially in regulated sectors such as finance, energy, and government agencies across Europe. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.

Mitigation Recommendations

Organizations should immediately verify if they are running LogStare Collector version 2.4.1 or earlier and plan to upgrade to a patched version once available from LogStare Inc. In the interim, restrict network access to the UserRegistration endpoint by implementing firewall rules or network segmentation to limit exposure to trusted administrative hosts only. Monitor logs for unusual user account creation activities or unexpected HTTP requests targeting the registration functionality. Employ application-layer firewalls or intrusion detection systems to detect and block crafted HTTP requests attempting to exploit this vulnerability. Review and tighten user privilege assignments to minimize the number of users with any registration capabilities. Conduct regular audits of user accounts within LogStare Collector to identify and remove unauthorized accounts promptly. Engage with the vendor for timely patch releases and security advisories. Additionally, consider implementing multi-factor authentication for administrative access to reduce the risk of unauthorized account misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-10T08:14:00.950Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6920092a04dd2c5f9994c00c

Added to database: 11/21/2025, 6:39:38 AM

Last enriched: 11/21/2025, 6:53:45 AM

Last updated: 11/22/2025, 3:02:39 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats