Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68435: CWE-305: Authentication Bypass by Primary Weakness in nicotsx zerobyte

0
Critical
VulnerabilityCVE-2025-68435cvecve-2025-68435cwe-305
Published: Wed Dec 17 2025 (12/17/2025, 23:10:38 UTC)
Source: CVE Database V5
Vendor/Project: nicotsx
Product: zerobyte

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:23:46 UTC

Technical Analysis

CVE-2025-68435 is an authentication bypass vulnerability classified under CWE-305 affecting the Zerobyte backup automation tool developed by nicotsx. Versions prior to 0.18.5 and 0.19.0 fail to properly enforce authentication middleware on certain API endpoints, resulting in these endpoints being accessible without valid session credentials. This flaw allows unauthenticated attackers to interact with the Zerobyte API, potentially accessing or manipulating backup data, which can lead to severe confidentiality and integrity breaches. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by its CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability does not impact availability directly but poses a critical risk due to unauthorized data exposure or modification. The vendor has addressed the issue in versions 0.18.5 and 0.19.0. Until upgrades can be applied, organizations are advised to restrict Zerobyte access to trusted internal networks using firewall rules or network segmentation to mitigate exposure. No public exploits have been reported, but the high CVSS score (9.1) reflects the critical nature of this vulnerability and the urgency for remediation.

Potential Impact

For European organizations, the impact of CVE-2025-68435 can be substantial, especially for those relying on Zerobyte for backup automation in environments where the tool is exposed beyond internal networks. Unauthorized access to backup data can lead to data breaches involving sensitive or regulated information, violating GDPR and other data protection laws, potentially resulting in heavy fines and reputational damage. Integrity compromise of backup data can disrupt disaster recovery processes, leading to operational downtime and loss of business continuity. Organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk due to the sensitivity of their data and regulatory requirements. The ease of exploitation without authentication increases the threat level, making it feasible for attackers to gain unauthorized access remotely. The lack of known exploits in the wild currently provides a small window for mitigation, but the critical severity demands immediate action to prevent potential attacks.

Mitigation Recommendations

1. Upgrade Zerobyte instances immediately to version 0.18.5 or 0.19.0 where the authentication bypass vulnerability is fixed. 2. Until upgrades are possible, restrict network access to Zerobyte API endpoints strictly to trusted internal networks using firewall rules, VPNs, or network segmentation to prevent exposure to untrusted or public networks. 3. Conduct thorough audits of Zerobyte deployments to identify any instances exposed externally and remediate accordingly. 4. Implement monitoring and logging on Zerobyte API endpoints to detect any unauthorized access attempts or anomalous activity. 5. Review and enforce least privilege principles for Zerobyte user accounts and API access. 6. Incorporate Zerobyte vulnerability checks into regular vulnerability management and patching cycles. 7. Educate IT and security teams about the critical nature of this vulnerability and the importance of timely patching and network access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:43:01.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69433981058703ef3fd47411

Added to database: 12/17/2025, 11:15:13 PM

Last enriched: 12/17/2025, 11:23:46 PM

Last updated: 12/18/2025, 8:04:14 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats