Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68164: CWE-203 in JetBrains TeamCity

0
Low
VulnerabilityCVE-2025-68164cvecve-2025-68164cwe-203
Published: Tue Dec 16 2025 (12/16/2025, 15:27:28 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

In JetBrains TeamCity before 2025.11 port enumeration was possible via the Perforce connection test

AI-Powered Analysis

AILast updated: 12/16/2025, 15:42:51 UTC

Technical Analysis

CVE-2025-68164 is a vulnerability classified under CWE-203 (Information Exposure Through Discrepancy) affecting JetBrains TeamCity, a popular continuous integration and build management system. The flaw exists in versions prior to 2025.11 and allows authenticated users with high privileges to enumerate network ports via the Perforce connection test functionality. This means that when a user tests the connection to a Perforce server within TeamCity, the system inadvertently reveals information about open or closed ports, which can be leveraged to map network configurations. The vulnerability requires authentication with elevated privileges (PR:H) but does not require user interaction beyond that. The CVSS v3.1 base score is 2.7, indicating low severity, with an attack vector of network (AV:N), low attack complexity (AC:L), and no impact on integrity or availability, only limited confidentiality impact (C:L). No known exploits have been reported in the wild, and no official patches have been linked yet. This vulnerability primarily aids attackers in reconnaissance phases by providing network topology insights that could be used to plan further attacks or lateral movement within an environment.

Potential Impact

For European organizations, the impact of CVE-2025-68164 is primarily limited to information disclosure. While the vulnerability does not directly compromise data integrity or system availability, it can facilitate attackers or malicious insiders in gathering network configuration details, specifically port states related to Perforce servers integrated with TeamCity. This reconnaissance capability could assist in crafting more targeted attacks or exploiting other vulnerabilities. Organizations heavily reliant on TeamCity for CI/CD pipelines and using Perforce as their version control system are at higher risk. The exposure of port information could lead to increased risk of lateral movement or unauthorized access if combined with other vulnerabilities or misconfigurations. However, since exploitation requires authenticated high-privilege access, the threat is mitigated by strong access controls. The low CVSS score reflects the limited scope and impact of this vulnerability, but it remains a concern for organizations with sensitive development environments or strict compliance requirements.

Mitigation Recommendations

To mitigate CVE-2025-68164, European organizations should implement the following specific measures: 1) Restrict high-privilege access to TeamCity, ensuring only trusted administrators can perform Perforce connection tests. 2) Monitor and audit usage of the Perforce connection test feature to detect unusual or unauthorized activity. 3) Apply the latest TeamCity updates and patches once JetBrains releases a fix addressing this vulnerability. 4) Consider network segmentation to isolate build servers and version control systems, limiting exposure of port information. 5) Employ strong authentication mechanisms such as multi-factor authentication (MFA) for TeamCity administrative accounts. 6) Review and harden Perforce server configurations to minimize unnecessary open ports and services. 7) Educate development and operations teams about the risks of information disclosure and the importance of adhering to least privilege principles. These targeted actions go beyond generic advice by focusing on controlling access to the vulnerable feature and limiting the potential reconnaissance benefits an attacker could gain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-12-16T11:54:39.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69417c3609f61faec595077d

Added to database: 12/16/2025, 3:35:18 PM

Last enriched: 12/16/2025, 3:42:51 PM

Last updated: 12/17/2025, 6:13:49 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats