Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65238: n/a

0
Unknown
VulnerabilityCVE-2025-65238cvecve-2025-65238
Published: Wed Nov 26 2025 (11/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the getSubUsersByProvider function of OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 allows attackers with low-level privileges to dump user records and access sensitive information.

AI-Powered Analysis

AILast updated: 11/26/2025, 16:51:53 UTC

Technical Analysis

CVE-2025-65238 is a security vulnerability identified in the OpenCode Systems USSD Gateway OC Release 5, specifically version 6.13.11. The vulnerability arises from incorrect access control in the getSubUsersByProvider function, which is designed to retrieve user records associated with a given provider. Due to insufficient access restrictions, attackers possessing only low-level privileges can exploit this flaw to dump user records, thereby gaining unauthorized access to sensitive information. The vulnerability does not require elevated privileges or complex attack vectors, making it relatively easy to exploit once access to the system is obtained. The USSD Gateway is typically used by telecommunications providers to manage USSD sessions, which are critical for mobile banking, service subscriptions, and other telecom services. Exposure of user data through this vulnerability could lead to privacy breaches, identity theft, and further targeted attacks. Although no public exploits have been reported yet, the vulnerability's presence in a critical telecom component suggests a high risk if left unmitigated. The lack of a CVSS score indicates that the vulnerability is newly published and pending formal severity assessment. However, based on the nature of the flaw—unauthorized data disclosure via access control failure—the threat is significant. The vulnerability affects all deployments running the specified version of the USSD Gateway, and no patch links are currently available, indicating that organizations must rely on configuration changes or vendor advisories for mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-65238 could be substantial, particularly for telecom operators and financial institutions that utilize USSD services for customer interactions and transactions. Unauthorized access to user records can lead to the exposure of personally identifiable information (PII), financial data, and authentication credentials, undermining customer trust and violating data protection regulations such as GDPR. The compromise of sensitive user data could facilitate identity theft, fraud, and targeted phishing attacks. Additionally, the breach could result in regulatory penalties and reputational damage. Since USSD gateways are integral to mobile network operations, exploitation of this vulnerability could disrupt service integrity and availability indirectly by enabling further attacks. The risk is heightened in countries with widespread USSD usage for mobile payments and banking, common in both urban and rural areas. The absence of known exploits in the wild provides a window for proactive defense, but the ease of exploitation means that attackers with minimal privileges could leverage this vulnerability rapidly once discovered.

Mitigation Recommendations

Organizations should immediately audit and tighten access controls around the getSubUsersByProvider function within the OpenCode Systems USSD Gateway. Restrict access strictly to authorized administrative roles and implement role-based access control (RBAC) policies to prevent low-privilege users from invoking sensitive functions. Network segmentation and strict firewall rules should limit access to the USSD Gateway management interfaces. Monitoring and logging of access to user data retrieval functions should be enhanced to detect anomalous or unauthorized queries. In the absence of an official patch, organizations should engage with OpenCode Systems for guidance and prioritize deployment of any forthcoming security updates. Additionally, consider implementing data encryption at rest and in transit to reduce the impact of potential data leaks. Conduct regular security assessments and penetration testing focused on access control mechanisms. Finally, prepare incident response plans specific to data breaches involving USSD services to minimize damage in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69272cad6d0980878b3dd34e

Added to database: 11/26/2025, 4:37:01 PM

Last enriched: 11/26/2025, 4:51:53 PM

Last updated: 11/27/2025, 6:04:34 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats