Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66360: CWE-863 Incorrect Authorization in Logpoint SIEM

0
Medium
VulnerabilityCVE-2025-66360cvecve-2025-66360cwe-863
Published: Thu Nov 27 2025 (11/27/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Logpoint
Product: SIEM

Description

An issue was discovered in Logpoint before 7.7.0. An improperly configured access control policy exposes sensitive Logpoint internal service (Redis) information to li-admin users. This can lead to privilege escalation.

AI-Powered Analysis

AILast updated: 11/27/2025, 23:56:31 UTC

Technical Analysis

CVE-2025-66360 is a security vulnerability identified in Logpoint versions before 7.7.0. The core issue arises from an improperly configured access control policy that inadvertently exposes sensitive internal service information related to Redis, a key-value store used internally by Logpoint. Specifically, li-admin users—who typically have limited administrative privileges—can access Redis service details that should be restricted. This exposure can be leveraged to escalate privileges beyond the intended scope, potentially allowing attackers or malicious insiders to gain unauthorized control over the Logpoint system. The vulnerability does not require external network exploitation but depends on the attacker having li-admin level access, which may be obtained through other means. Redis exposure can lead to manipulation of internal data, configuration changes, or unauthorized command execution within the Logpoint environment. No public exploits have been reported yet, but the risk remains significant due to the sensitive nature of SIEM platforms in monitoring and managing security events. The absence of a CVSS score indicates this is a newly published vulnerability, with technical details still emerging. The recommended remediation is upgrading to Logpoint version 7.7.0 or later, where the access control policy is corrected. Additionally, organizations should audit and tighten access controls to ensure li-admin users cannot access internal Redis service information. This vulnerability highlights the importance of strict internal service segmentation and least privilege principles within security monitoring platforms.

Potential Impact

For European organizations, the impact of CVE-2025-66360 can be substantial. Logpoint is widely used as a SIEM solution to collect, analyze, and correlate security event data. Unauthorized privilege escalation within Logpoint can compromise the integrity and confidentiality of security logs and alerts, potentially allowing attackers to hide their activities or manipulate security monitoring. This undermines incident detection and response capabilities, increasing the risk of prolonged undetected breaches. Organizations in critical sectors such as finance, energy, telecommunications, and government are particularly vulnerable due to their reliance on SIEM for regulatory compliance and threat detection. The exposure of Redis internal service information could also lead to broader system compromise if attackers leverage escalated privileges to move laterally or disrupt service availability. Given the centralized role of Logpoint in security operations, exploitation could have cascading effects on organizational security posture and data protection obligations under GDPR. The lack of known exploits currently reduces immediate risk, but the vulnerability’s nature demands prompt attention to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-66360, European organizations should: 1) Immediately upgrade Logpoint installations to version 7.7.0 or later, where the access control misconfiguration is resolved. 2) Conduct a thorough audit of access control policies, specifically verifying that li-admin users do not have access to internal Redis service information or other sensitive internal components. 3) Implement strict role-based access control (RBAC) and enforce the principle of least privilege to limit user permissions within Logpoint. 4) Monitor internal access logs for unusual activity by li-admin users or attempts to access Redis or other internal services. 5) Segment internal services such as Redis from user-facing components to reduce exposure risk. 6) Incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios. 7) Engage with Logpoint support or security advisories for any additional patches or configuration guidance. These steps go beyond generic advice by focusing on internal service segmentation, access policy refinement, and proactive monitoring tailored to the vulnerability’s specifics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6928e1a8b0d67dda9e866c5f

Added to database: 11/27/2025, 11:41:28 PM

Last enriched: 11/27/2025, 11:56:31 PM

Last updated: 12/4/2025, 11:23:49 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats