Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65185: n/a

0
Low
VulnerabilityCVE-2025-65185cvecve-2025-65185
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

There is a username enumeration via local user login in Entrinsik Informer v5.10.1 which allows malicious users to enumerate users by entering an OTP code and new password then reviewing application responses.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:32:21 UTC

Technical Analysis

CVE-2025-65185 is a security vulnerability identified in Entrinsik Informer version 5.10.1 that enables username enumeration via the local user login mechanism. The vulnerability arises because the application responds differently when a malicious user submits an OTP code and a new password during the login process. By carefully analyzing these response variations, an attacker can confirm the existence of specific usernames within the system. This form of information disclosure does not require prior authentication, making it accessible to unauthenticated attackers. Username enumeration is a critical step in targeted attacks such as credential stuffing, brute force, or social engineering campaigns. Although no public exploits have been reported, the vulnerability's presence increases the attack surface by allowing adversaries to gather valid user identities. The lack of a CVSS score indicates that the vulnerability is newly published and not yet fully assessed. The vulnerability primarily impacts confidentiality by exposing user identity information, which can be leveraged for subsequent attacks. The affected product, Entrinsik Informer, is a business intelligence and reporting platform used by various organizations to manage and analyze data. The vulnerability's exploitation requires interaction with the login interface, specifically the OTP and password reset functionality, which suggests that the attacker must have access to the login page but no valid credentials are necessary. The absence of patches or mitigation details in the provided information highlights the need for immediate defensive measures by organizations using this software.

Potential Impact

The primary impact of CVE-2025-65185 is the compromise of user confidentiality through username enumeration. By revealing valid usernames, attackers can facilitate targeted attacks such as phishing, credential stuffing, or brute force attempts, potentially leading to unauthorized access. For European organizations, especially those handling sensitive or regulated data, this vulnerability increases the risk of data breaches and compliance violations under GDPR. The exposure of user identities can also damage organizational reputation and trust. While the vulnerability does not directly allow privilege escalation or data manipulation, it significantly lowers the barrier for attackers to conduct more sophisticated attacks. Organizations relying on Entrinsik Informer for critical business intelligence functions may face operational risks if attackers leverage enumerated usernames to gain unauthorized access. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant reconnaissance tool for threat actors targeting European entities.

Mitigation Recommendations

European organizations using Entrinsik Informer v5.10.1 should implement several specific mitigations: 1) Monitor authentication logs for unusual OTP and password reset attempts to detect enumeration activity early. 2) Implement rate limiting and account lockout policies on the OTP and password reset endpoints to hinder automated enumeration attempts. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious login patterns indicative of enumeration. 4) Conduct internal penetration testing focused on authentication flows to identify and remediate similar weaknesses. 5) Engage with Entrinsik support or security teams to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Educate users about phishing and social engineering risks that may be facilitated by username disclosure. 7) Consider multi-factor authentication enforcement beyond OTP to reduce the risk of account compromise. 8) Review and harden error messages and response behaviors in the login process to minimize information leakage. These targeted actions go beyond generic advice and directly address the enumeration vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942d8c9b2cbfb3efaad4196

Added to database: 12/17/2025, 4:22:33 PM

Last enriched: 12/17/2025, 4:32:21 PM

Last updated: 12/18/2025, 6:19:56 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats