Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65176: n/a

0
High
VulnerabilityCVE-2025-65176cvecve-2025-65176
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Dynatrace OneAgent before 1.325.47. When attempting to access a remote network share from a machine where OneAgent is installed and receiving a "STATUS_LOGON_FAILURE" error, the agent will retrieve every user token on the machine and repeatedly attempt to access the network share while impersonating them. The exploitation of this vulnerability can allow an unprivileged attacker with access to the affected system to perform NTLM relay attacks.

AI-Powered Analysis

AILast updated: 12/22/2025, 19:24:35 UTC

Technical Analysis

CVE-2025-65176 is a vulnerability found in Dynatrace OneAgent versions before 1.325.47. The issue arises when the agent attempts to access a remote network share and receives a STATUS_LOGON_FAILURE error, indicating failed authentication. Instead of failing gracefully, the agent retrieves every user token present on the local machine and repeatedly attempts to access the network share by impersonating each user token. This behavior can be exploited by an unprivileged attacker who has local access to the affected system to conduct NTLM relay attacks. NTLM relay attacks allow an attacker to intercept and relay authentication requests to gain unauthorized access to network resources without needing the actual credentials. The vulnerability stems from improper handling of authentication failures and excessive token impersonation, violating the principle of least privilege (CWE-284). The CVSS v3.1 base score is 7.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and high confidentiality impact. While no known exploits are publicly reported, the vulnerability poses a significant risk in environments where attackers can gain local access. The lack of available patches at the time of publication necessitates immediate attention from affected organizations.

Potential Impact

For European organizations, this vulnerability presents a significant risk, especially in environments where Dynatrace OneAgent is deployed on endpoints or servers with access to network shares. Successful exploitation could allow attackers to impersonate legitimate users and relay NTLM authentication requests, potentially leading to unauthorized access to sensitive network resources, lateral movement, and data exfiltration. Confidentiality is primarily impacted, as attackers can gain access to resources without valid credentials. The vulnerability does not affect integrity or availability directly but can facilitate further attacks that compromise these aspects. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and critical infrastructure, could face severe compliance and reputational consequences if exploited. The ease of exploitation (no privileges or user interaction required) increases the threat level, particularly in environments with weak local access controls or where endpoint security is insufficient.

Mitigation Recommendations

1. Immediately upgrade Dynatrace OneAgent to version 1.325.47 or later once available to address the vulnerability. 2. Until patches are deployed, restrict local access to systems running OneAgent to trusted personnel only and enforce strict endpoint security controls. 3. Monitor network share access logs and authentication attempts for unusual patterns, such as repeated failed logons or multiple user token impersonations. 4. Implement network-level protections against NTLM relay attacks, including disabling NTLM where feasible, enforcing SMB signing, and deploying SMB relay protections on network devices. 5. Use endpoint detection and response (EDR) tools to detect anomalous impersonation or token usage behaviors. 6. Educate IT and security teams about the vulnerability and signs of exploitation to enable rapid incident response. 7. Review and tighten permissions on network shares to minimize the impact of any successful relay attack. 8. Employ multi-factor authentication (MFA) for network resource access where possible to reduce reliance on NTLM authentication.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69405ac4d9bcdf3f3dfb23bf

Added to database: 12/15/2025, 7:00:20 PM

Last enriched: 12/22/2025, 7:24:35 PM

Last updated: 2/7/2026, 4:35:58 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats