Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68164: CWE-203 in JetBrains TeamCity

0
Low
VulnerabilityCVE-2025-68164cvecve-2025-68164cwe-203
Published: Tue Dec 16 2025 (12/16/2025, 15:27:28 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

CVE-2025-68164 is a low-severity information disclosure vulnerability in JetBrains TeamCity versions prior to 2025. 11. It allows an authenticated user with high privileges to perform port enumeration via the Perforce connection test feature. The vulnerability does not impact integrity or availability and requires no user interaction beyond authentication. There are no known exploits in the wild, and no patches have been published yet. The CVSS score is 2. 7, reflecting limited confidentiality impact and the need for privileged access. European organizations using TeamCity, especially those integrating Perforce for version control, should be aware of this issue. Mitigation involves restricting high-privilege access, monitoring usage of the Perforce connection test, and applying patches once available. Countries with significant software development sectors and JetBrains customer bases, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 12/23/2025, 15:58:43 UTC

Technical Analysis

CVE-2025-68164 is an information disclosure vulnerability classified under CWE-203 (Information Exposure Through Discrepancy) found in JetBrains TeamCity, a continuous integration and build management system widely used in software development environments. The vulnerability exists in versions prior to 2025.11 and enables port enumeration via the Perforce connection test feature. Specifically, an authenticated user with high privileges can leverage this feature to probe network ports, potentially revealing information about network configurations or services running on the TeamCity server or connected infrastructure. The vulnerability does not allow modification of data or disruption of service, limiting its impact to confidentiality. The CVSS 3.1 base score is 2.7, indicating low severity, with attack vector being network, low attack complexity, requiring privileges, and no user interaction. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability could be used by insiders or attackers who have already gained elevated access to gather intelligence for further attacks or lateral movement within a network.

Potential Impact

For European organizations, the primary impact of CVE-2025-68164 is limited to confidentiality loss through information disclosure. While the vulnerability does not directly compromise system integrity or availability, the ability to enumerate ports can aid attackers in mapping internal network structures and identifying additional attack vectors. Organizations using JetBrains TeamCity integrated with Perforce version control systems are particularly at risk. This could be relevant for software development firms, IT service providers, and enterprises with in-house development teams. The impact is mitigated by the requirement for high privilege authentication, reducing the risk from external attackers but increasing concern about insider threats or compromised credentials. The vulnerability could facilitate more sophisticated attacks if combined with other vulnerabilities or social engineering tactics. Given the widespread use of TeamCity in Europe, especially in countries with strong software industries, the threat warrants attention despite its low severity rating.

Mitigation Recommendations

To mitigate CVE-2025-68164, European organizations should implement the following specific measures: 1) Restrict access to TeamCity instances to only trusted, high-privilege users and enforce strict role-based access controls to minimize the number of users who can perform Perforce connection tests. 2) Monitor and audit usage of the Perforce connection test feature to detect unusual or unauthorized port scanning activities. 3) Network segmentation should be employed to limit the exposure of TeamCity servers and connected infrastructure, reducing the usefulness of port enumeration. 4) Employ strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 5) Stay informed about JetBrains security advisories and apply patches promptly once they become available. 6) Consider disabling or restricting the Perforce connection test feature if it is not essential for operations. 7) Conduct regular security assessments and penetration tests focusing on internal threat vectors and privilege misuse scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-12-16T11:54:39.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69417c3609f61faec595077d

Added to database: 12/16/2025, 3:35:18 PM

Last enriched: 12/23/2025, 3:58:43 PM

Last updated: 2/7/2026, 6:47:03 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats