Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66956: n/a

0
Critical
VulnerabilityCVE-2025-66956cvecve-2025-66956
Published: Wed Mar 11 2026 (03/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Access Control in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote attackers to access and execute attachments via a computable URL.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:12:59 UTC

Technical Analysis

CVE-2025-66956 is a critical security vulnerability identified in Asseco SEE Live 2.0, specifically impacting the Contact Plan, E-Mail, SMS, and Fax components. The root cause is insecure access control (CWE-284), which allows remote attackers with limited privileges (PR:L) to bypass intended restrictions and access or execute attachments through a computable URL. This flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N), making it highly accessible to attackers. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) and has a scope of changed impact (S:C), meaning it can affect resources beyond the initially compromised component. Although no affected versions are explicitly listed, the vulnerability is tied to Asseco SEE Live 2.0. No patches or fixes have been published yet, and no active exploitation has been reported. The vulnerability's exploitation could lead to unauthorized execution of potentially malicious attachments, resulting in full system compromise, data leakage, or disruption of communication services. The lack of user interaction and low attack complexity further elevate the risk. Organizations relying on this software should consider this a critical threat requiring immediate attention.

Potential Impact

The impact of CVE-2025-66956 is severe for organizations using Asseco SEE Live 2.0, particularly those relying on its communication components (Contact Plan, E-Mail, SMS, Fax). Successful exploitation can lead to unauthorized execution of attachments, potentially allowing attackers to execute arbitrary code, steal sensitive data, disrupt communication workflows, or pivot within the network. This can result in significant confidentiality breaches, data integrity violations, and service outages. Given the critical CVSS score of 9.9, the vulnerability poses a high risk of widespread damage, including operational disruption and reputational harm. The ability to exploit remotely without user interaction increases the likelihood of automated attacks and wormable scenarios. Organizations in sectors with high dependency on Asseco SEE Live 2.0 for communication—such as finance, government, healthcare, and large enterprises—face elevated risks. The absence of patches means that attackers could exploit this vulnerability once a working exploit is developed, emphasizing the urgency of mitigation.

Mitigation Recommendations

1. Immediately restrict network access to Asseco SEE Live 2.0 components, especially the Contact Plan, E-Mail, SMS, and Fax modules, using firewalls and network segmentation to limit exposure to trusted users and systems only. 2. Implement strict access control policies and review user privileges to ensure least privilege principles are enforced, minimizing the risk of privilege escalation. 3. Monitor logs and network traffic for unusual access patterns or attempts to access computable URLs related to attachments, enabling early detection of exploitation attempts. 4. Disable or limit attachment execution capabilities where possible until a patch is available. 5. Engage with Asseco support or vendor channels to obtain official patches or updates as soon as they are released. 6. Prepare incident response plans specifically addressing potential exploitation scenarios involving attachment execution and unauthorized access. 7. Educate users and administrators about the risk and signs of exploitation to enhance organizational readiness. 8. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious URL access patterns related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b1d0c22f860ef943757517

Added to database: 3/11/2026, 8:29:54 PM

Last enriched: 3/19/2026, 2:12:59 AM

Last updated: 4/26/2026, 9:29:29 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses