Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64064: n/a

0
Unknown
VulnerabilityCVE-2025-64064cvecve-2025-64064
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check user permissions before processing a PATCH request to modify the PP_SECURITY_PROFILE_ID. Because of weak access controls any low level user can use this API and change their permission to Administrator by using PP_SECURITY_PROFILE_ID=2 inside body of request and escalate privileges.

AI-Powered Analysis

AILast updated: 11/25/2025, 18:52:08 UTC

Technical Analysis

CVE-2025-64064 is a critical privilege escalation vulnerability found in Primakon Pi Portal version 1.0.18, specifically in the /api/v2/pp_users REST API endpoint. This endpoint accepts PATCH requests intended to update user attributes, including the PP_SECURITY_PROFILE_ID, which controls user privilege levels. Due to inadequate access control validation, the API fails to verify whether the requesting user has the necessary permissions to modify this sensitive attribute. Consequently, any authenticated user with low-level privileges can craft a PATCH request containing PP_SECURITY_PROFILE_ID=2, which corresponds to Administrator-level access, thereby escalating their privileges without authorization. This vulnerability stems from weak or missing authorization checks on the server side, representing a classic broken access control issue. Although no public exploits have been reported yet, the vulnerability's nature makes it highly exploitable by insiders or attackers who have obtained low-level credentials. The impact of successful exploitation includes unauthorized administrative access, enabling attackers to manipulate system configurations, access sensitive data, create or delete users, and potentially disrupt system operations. The lack of a CVSS score suggests the vulnerability is newly disclosed, but the technical details indicate a high severity due to the direct privilege escalation vector and the critical nature of administrative privileges. Organizations using Primakon Pi Portal should urgently assess their exposure, implement compensating controls, and monitor API usage for anomalous privilege modifications. The absence of official patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation.

Potential Impact

For European organizations, exploitation of CVE-2025-64064 could have severe consequences. Unauthorized privilege escalation to Administrator level compromises the confidentiality, integrity, and availability of the affected systems. Attackers gaining administrative access can exfiltrate sensitive data, alter or delete critical information, disrupt business operations, and potentially pivot to other network segments. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Primakon Pi Portal for user management or operational control are particularly vulnerable. The breach of administrative credentials can lead to regulatory non-compliance, financial losses, reputational damage, and operational downtime. Given the centralized nature of user management in many enterprises, a single exploited instance could cascade into broader network compromise. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation means the threat is imminent once attackers become aware. European entities must consider the risk of insider threats and external attackers who may have obtained low-level credentials through phishing or other means.

Mitigation Recommendations

1. Immediately restrict access to the /api/v2/pp_users endpoint to only trusted and necessary users, ideally limiting it to administrators. 2. Implement strict server-side authorization checks to validate that any request to modify PP_SECURITY_PROFILE_ID is performed only by users with existing administrative privileges. 3. Monitor API logs for unusual PATCH requests attempting to change PP_SECURITY_PROFILE_ID values, especially those originating from low-privilege accounts. 4. Employ multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise. 5. If possible, disable or isolate the vulnerable API endpoint until a vendor patch is available. 6. Conduct regular audits of user privilege assignments to detect unauthorized escalations. 7. Engage with Primakon support or vendor channels to obtain or request a security patch addressing this vulnerability. 8. Educate users about the risks of credential theft and enforce strong password policies. 9. Use network segmentation to limit the impact of compromised accounts. 10. Prepare incident response plans specifically addressing privilege escalation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6925f747ea01c5f8b834aefe

Added to database: 11/25/2025, 6:36:55 PM

Last enriched: 11/25/2025, 6:52:08 PM

Last updated: 11/25/2025, 7:40:19 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats