Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66723: n/a

0
High
VulnerabilityCVE-2025-66723cvecve-2025-66723
Published: Tue Dec 30 2025 (12/30/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

inMusic Brands Engine DJ before 4.3.4 suffers from Insecure Permissions due to exposed HTTP service in the Remote Library, which allows attackers to access all files and network paths.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:53:37 UTC

Technical Analysis

CVE-2025-66723 is a vulnerability identified in inMusic Brands Engine DJ software versions prior to 4.3.4. The root cause is insecure permissions stemming from an exposed HTTP service within the Remote Library feature. This exposure allows remote attackers to access all files and network paths available to the service without requiring any authentication or user interaction. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the software improperly restricts access to sensitive resources. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can read sensitive files and potentially map network shares, which could facilitate further lateral movement or data exfiltration. No integrity or availability impacts are noted. Although no public exploits have been reported yet, the ease of exploitation and the broad access granted make this a critical concern for affected users. The lack of available patches at the time of reporting means organizations must rely on interim mitigations until an update is released.

Potential Impact

For European organizations, the exposure of sensitive files and network paths can lead to significant data breaches, intellectual property theft, and potential exposure of personal data protected under GDPR. Industries such as music production, event management, and entertainment technology—where Engine DJ software is commonly used—are at heightened risk. Attackers could leverage this vulnerability to gain insights into network architecture or harvest credentials stored in accessible files, enabling further compromise. The confidentiality breach could damage brand reputation, lead to regulatory fines, and disrupt business operations. Since the vulnerability does not affect integrity or availability directly, the immediate operational impact may be limited, but the long-term consequences of data exposure are severe. European organizations with remote or cloud-based deployments of Engine DJ are particularly vulnerable due to the network-exposed HTTP service.

Mitigation Recommendations

1. Immediately restrict network access to the Remote Library HTTP service using firewalls or network segmentation to limit exposure to trusted hosts only. 2. Implement strict access controls and authentication mechanisms around the HTTP service if possible, even before official patches are available. 3. Monitor network traffic for unusual access patterns to the Remote Library service to detect potential exploitation attempts. 4. Regularly audit file permissions and network shares on systems running Engine DJ to ensure no unintended exposure. 5. Plan and prioritize upgrading to version 4.3.4 or later as soon as the patch is released by inMusic Brands. 6. Educate IT and security teams about this vulnerability to ensure rapid response and containment. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on unauthorized file access attempts related to this service.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450a0db813ff03e2bda7b

Added to database: 12/30/2025, 10:22:24 PM

Last enriched: 1/6/2026, 11:53:37 PM

Last updated: 1/7/2026, 4:12:44 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats