Skip to main content

CVE-2025-6523: CWE-1391: Use of Weak Credentials in Devolutions Server

High
VulnerabilityCVE-2025-6523cvecve-2025-6523cwe-1391
Published: Tue Jul 22 2025 (07/22/2025, 17:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe. This issue affects the following versions : * Devolutions Server 2025.2.2.0 through 2025.2.3.0 * Devolutions Server 2025.1.11.0 and earlier

AI-Powered Analysis

AILast updated: 07/22/2025, 17:31:26 UTC

Technical Analysis

CVE-2025-6523 identifies a vulnerability in Devolutions Server versions 2025.2.2.0 through 2025.2.3.0 and all earlier versions up to 2025.1.11.0. The issue stems from the use of weak credentials within the emergency authentication component of the server. Specifically, the server generates short emergency codes intended for emergency access scenarios. However, these codes are weak enough that an unauthenticated attacker can feasibly brute force them within a reasonable timeframe, thereby bypassing authentication controls. This vulnerability is categorized under CWE-1391, which relates to the use of weak credentials that can be easily guessed or brute forced. The emergency authentication mechanism is designed to provide fallback access, but the weak code generation undermines the security model, allowing unauthorized access without valid credentials or prior authentication. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability affects a critical component of Devolutions Server, which is commonly used for privileged access management and remote connection management, making it a significant risk if exploited.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized access to sensitive systems managed via Devolutions Server. Given that Devolutions Server is used to manage privileged credentials and remote connections, an attacker bypassing authentication could gain control over critical infrastructure, internal networks, or sensitive data repositories. This could result in data breaches, lateral movement within networks, disruption of business operations, and potential compliance violations under regulations such as GDPR. The emergency authentication feature is likely intended for use in critical situations, so its compromise could also undermine incident response processes. The lack of authentication requirement and the feasibility of brute forcing the emergency codes increase the risk of automated attacks. Although no exploits are currently known, the vulnerability's presence in multiple versions means many organizations may be exposed, especially those that have not updated to patched versions or implemented compensating controls.

Mitigation Recommendations

Organizations should immediately assess their deployment of Devolutions Server to determine if they are running affected versions (2025.2.2.0 through 2025.2.3.0 or earlier than 2025.1.11.0). Since no official patches are currently linked, organizations should contact Devolutions for updates or advisories. In the interim, it is critical to disable or restrict the emergency authentication feature if possible, or enforce additional controls such as IP whitelisting, multi-factor authentication (MFA), or network segmentation to limit access to the server. Monitoring and alerting on repeated failed emergency code attempts should be implemented to detect brute force attempts early. Additionally, organizations should review and harden their overall privileged access management policies, ensuring that emergency access mechanisms are tightly controlled and audited. Regularly updating to the latest software versions once patches are available is essential. Finally, conducting penetration testing focused on emergency authentication pathways can help identify weaknesses before attackers do.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
DEVOLUTIONS
Date Reserved
2025-06-23T14:04:39.194Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687fc762a83201eaac1e0101

Added to database: 7/22/2025, 5:16:18 PM

Last enriched: 7/22/2025, 5:31:26 PM

Last updated: 8/21/2025, 5:42:53 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats