CVE-2025-6523: CWE-1391: Use of Weak Credentials in Devolutions Server
Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe. This issue affects the following versions : * Devolutions Server 2025.2.2.0 through 2025.2.3.0 * Devolutions Server 2025.1.11.0 and earlier
AI Analysis
Technical Summary
CVE-2025-6523 identifies a vulnerability in Devolutions Server versions 2025.2.2.0 through 2025.2.3.0 and all earlier versions up to 2025.1.11.0. The issue stems from the use of weak credentials within the emergency authentication component of the server. Specifically, the server generates short emergency codes intended for emergency access scenarios. However, these codes are weak enough that an unauthenticated attacker can feasibly brute force them within a reasonable timeframe, thereby bypassing authentication controls. This vulnerability is categorized under CWE-1391, which relates to the use of weak credentials that can be easily guessed or brute forced. The emergency authentication mechanism is designed to provide fallback access, but the weak code generation undermines the security model, allowing unauthorized access without valid credentials or prior authentication. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability affects a critical component of Devolutions Server, which is commonly used for privileged access management and remote connection management, making it a significant risk if exploited.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized access to sensitive systems managed via Devolutions Server. Given that Devolutions Server is used to manage privileged credentials and remote connections, an attacker bypassing authentication could gain control over critical infrastructure, internal networks, or sensitive data repositories. This could result in data breaches, lateral movement within networks, disruption of business operations, and potential compliance violations under regulations such as GDPR. The emergency authentication feature is likely intended for use in critical situations, so its compromise could also undermine incident response processes. The lack of authentication requirement and the feasibility of brute forcing the emergency codes increase the risk of automated attacks. Although no exploits are currently known, the vulnerability's presence in multiple versions means many organizations may be exposed, especially those that have not updated to patched versions or implemented compensating controls.
Mitigation Recommendations
Organizations should immediately assess their deployment of Devolutions Server to determine if they are running affected versions (2025.2.2.0 through 2025.2.3.0 or earlier than 2025.1.11.0). Since no official patches are currently linked, organizations should contact Devolutions for updates or advisories. In the interim, it is critical to disable or restrict the emergency authentication feature if possible, or enforce additional controls such as IP whitelisting, multi-factor authentication (MFA), or network segmentation to limit access to the server. Monitoring and alerting on repeated failed emergency code attempts should be implemented to detect brute force attempts early. Additionally, organizations should review and harden their overall privileged access management policies, ensuring that emergency access mechanisms are tightly controlled and audited. Regularly updating to the latest software versions once patches are available is essential. Finally, conducting penetration testing focused on emergency authentication pathways can help identify weaknesses before attackers do.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Switzerland
CVE-2025-6523: CWE-1391: Use of Weak Credentials in Devolutions Server
Description
Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe. This issue affects the following versions : * Devolutions Server 2025.2.2.0 through 2025.2.3.0 * Devolutions Server 2025.1.11.0 and earlier
AI-Powered Analysis
Technical Analysis
CVE-2025-6523 identifies a vulnerability in Devolutions Server versions 2025.2.2.0 through 2025.2.3.0 and all earlier versions up to 2025.1.11.0. The issue stems from the use of weak credentials within the emergency authentication component of the server. Specifically, the server generates short emergency codes intended for emergency access scenarios. However, these codes are weak enough that an unauthenticated attacker can feasibly brute force them within a reasonable timeframe, thereby bypassing authentication controls. This vulnerability is categorized under CWE-1391, which relates to the use of weak credentials that can be easily guessed or brute forced. The emergency authentication mechanism is designed to provide fallback access, but the weak code generation undermines the security model, allowing unauthorized access without valid credentials or prior authentication. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability affects a critical component of Devolutions Server, which is commonly used for privileged access management and remote connection management, making it a significant risk if exploited.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized access to sensitive systems managed via Devolutions Server. Given that Devolutions Server is used to manage privileged credentials and remote connections, an attacker bypassing authentication could gain control over critical infrastructure, internal networks, or sensitive data repositories. This could result in data breaches, lateral movement within networks, disruption of business operations, and potential compliance violations under regulations such as GDPR. The emergency authentication feature is likely intended for use in critical situations, so its compromise could also undermine incident response processes. The lack of authentication requirement and the feasibility of brute forcing the emergency codes increase the risk of automated attacks. Although no exploits are currently known, the vulnerability's presence in multiple versions means many organizations may be exposed, especially those that have not updated to patched versions or implemented compensating controls.
Mitigation Recommendations
Organizations should immediately assess their deployment of Devolutions Server to determine if they are running affected versions (2025.2.2.0 through 2025.2.3.0 or earlier than 2025.1.11.0). Since no official patches are currently linked, organizations should contact Devolutions for updates or advisories. In the interim, it is critical to disable or restrict the emergency authentication feature if possible, or enforce additional controls such as IP whitelisting, multi-factor authentication (MFA), or network segmentation to limit access to the server. Monitoring and alerting on repeated failed emergency code attempts should be implemented to detect brute force attempts early. Additionally, organizations should review and harden their overall privileged access management policies, ensuring that emergency access mechanisms are tightly controlled and audited. Regularly updating to the latest software versions once patches are available is essential. Finally, conducting penetration testing focused on emergency authentication pathways can help identify weaknesses before attackers do.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- DEVOLUTIONS
- Date Reserved
- 2025-06-23T14:04:39.194Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687fc762a83201eaac1e0101
Added to database: 7/22/2025, 5:16:18 PM
Last enriched: 7/22/2025, 5:31:26 PM
Last updated: 8/21/2025, 5:42:53 PM
Views: 32
Related Threats
CVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
CriticalCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.