Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65185: n/a

0
Low
VulnerabilityCVE-2025-65185cvecve-2025-65185
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

There is a username enumeration via local user login in Entrinsik Informer v5.10.1 which allows malicious users to enumerate users by entering an OTP code and new password then reviewing application responses.

AI-Powered Analysis

AILast updated: 01/05/2026, 11:16:31 UTC

Technical Analysis

CVE-2025-65185 identifies a username enumeration vulnerability in Entrinsik Informer version 5.10.1. The flaw arises during the local user login process, where an attacker with limited privileges can input an OTP code and a new password, then observe the application's responses to infer valid usernames. This behavior constitutes a CWE-203: Information Exposure Through Discrepancy. The vulnerability does not allow direct access to user credentials or system control but leaks information that can facilitate further targeted attacks such as phishing or brute force. The CVSS 3.1 score is 2.8, reflecting low severity due to the requirement for local access (AV:L), low attack complexity (AC:L), limited privileges (PR:L), and user interaction (UI:R). The impact is limited to confidentiality, with no integrity or availability impact. No patches or known exploits are currently available, but the issue is publicly disclosed as of December 17, 2025. Organizations using Entrinsik Informer should assess their exposure, especially if the system is accessible to multiple users or if user enumeration could lead to more severe attacks.

Potential Impact

For European organizations, the primary impact is the potential exposure of valid usernames, which can be leveraged in social engineering, phishing campaigns, or brute force attacks. While the vulnerability itself does not compromise passwords or system integrity, the information leakage can lower the barrier for attackers to target specific users. This is particularly concerning for organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, or government agencies. The requirement for local access and user interaction reduces the likelihood of remote exploitation but does not eliminate insider threat risks or attacks from compromised internal accounts. The overall impact on confidentiality is low but should be considered within the broader context of layered security controls and threat models.

Mitigation Recommendations

1. Restrict access to the Entrinsik Informer login interface to trusted users and networks only, using network segmentation and access control lists. 2. Implement monitoring and alerting for unusual login attempts or repeated OTP and password reset requests that could indicate enumeration attempts. 3. Enforce strong authentication policies and consider multi-factor authentication methods that do not rely solely on OTP codes vulnerable to enumeration. 4. Regularly review user account management procedures to detect and respond to suspicious activities promptly. 5. Engage with Entrinsik to obtain patches or updates addressing this vulnerability once available, and apply them promptly. 6. Educate users about phishing and social engineering risks that could be facilitated by username enumeration. 7. Consider implementing application-level protections such as uniform error messages and rate limiting on login attempts to reduce information leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942d8c9b2cbfb3efaad4196

Added to database: 12/17/2025, 4:22:33 PM

Last enriched: 1/5/2026, 11:16:31 AM

Last updated: 2/5/2026, 2:46:33 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats