CVE-2025-67223: n/a
CVE-2025-67223 is a vulnerability in the Aranda File Server component of Aranda Service Desk versions before 8. 3. 12. It involves the storage of daily activity logs with predictable filenames in a publicly accessible directory. This misconfiguration allows unauthenticated remote attackers to discover direct virtual paths to uploaded files and bypass access controls, enabling them to download sensitive documents that may contain personally identifiable information (PII). No official patch or remediation guidance has been provided yet. The vulnerability does not have an assigned CVSS score, but due to the exposure of sensitive data, it is assessed as high severity.
AI Analysis
Technical Summary
The Aranda File Server (AFS) in Aranda Service Desk prior to version 8.3.12 stores daily activity logs using predictable names in a directory accessible without authentication. This allows attackers to enumerate and access virtual paths to uploaded files, bypassing intended access controls. As a result, sensitive documents containing PII can be downloaded by unauthorized parties. There is no information about available patches or vendor advisories at this time. The vulnerability is publicly disclosed but no known exploits are reported in the wild.
Potential Impact
Unauthenticated remote attackers can access sensitive documents containing personally identifiable information by exploiting predictable log file naming and public directory access. This leads to unauthorized disclosure of sensitive data, potentially causing privacy violations and compliance issues.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict public access to the directory storing daily activity logs and implement access controls to prevent unauthorized file downloads.
CVE-2025-67223: n/a
Description
CVE-2025-67223 is a vulnerability in the Aranda File Server component of Aranda Service Desk versions before 8. 3. 12. It involves the storage of daily activity logs with predictable filenames in a publicly accessible directory. This misconfiguration allows unauthenticated remote attackers to discover direct virtual paths to uploaded files and bypass access controls, enabling them to download sensitive documents that may contain personally identifiable information (PII). No official patch or remediation guidance has been provided yet. The vulnerability does not have an assigned CVSS score, but due to the exposure of sensitive data, it is assessed as high severity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Aranda File Server (AFS) in Aranda Service Desk prior to version 8.3.12 stores daily activity logs using predictable names in a directory accessible without authentication. This allows attackers to enumerate and access virtual paths to uploaded files, bypassing intended access controls. As a result, sensitive documents containing PII can be downloaded by unauthorized parties. There is no information about available patches or vendor advisories at this time. The vulnerability is publicly disclosed but no known exploits are reported in the wild.
Potential Impact
Unauthenticated remote attackers can access sensitive documents containing personally identifiable information by exploiting predictable log file naming and public directory access. This leads to unauthorized disclosure of sensitive data, potentially causing privacy violations and compliance issues.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict public access to the directory storing daily activity logs and implement access controls to prevent unauthorized file downloads.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f0d09ecbff5d86102a30cf
Added to database: 4/28/2026, 3:22:06 PM
Last enriched: 4/28/2026, 3:36:59 PM
Last updated: 4/28/2026, 6:02:41 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.