Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9986: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Vadi Corporate Information Systems Ltd. Co. DIGIKENT

0
High
VulnerabilityCVE-2025-9986cvecve-2025-9986cwe-497
Published: Wed Feb 11 2026 (02/11/2026, 08:34:13 UTC)
Source: CVE Database V5
Vendor/Project: Vadi Corporate Information Systems Ltd. Co.
Product: DIGIKENT

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:59:00 UTC

Technical Analysis

CVE-2025-9986 is a vulnerability classified under CWE-497, indicating an exposure of sensitive system information to an unauthorized control sphere within the DIGIKENT product developed by Vadi Corporate Information Systems Ltd. Co. This vulnerability allows remote attackers to access sensitive system information without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability affects DIGIKENT versions up to 13092025, with the affected version listed as '0', which may indicate all current versions or a placeholder. The primary impact is on confidentiality (C:H), with limited impact on integrity (I:L) and no impact on availability (A:N). This means attackers can obtain sensitive data that could facilitate further attacks or reconnaissance but cannot directly alter data or disrupt services. The vulnerability was reserved in September 2025 and published in February 2026, with no known exploits in the wild and no patches currently available. DIGIKENT is a corporate information system, likely used in municipal or governmental contexts, which increases the potential impact of sensitive data exposure. The lack of authentication and user interaction requirements makes this vulnerability relatively easy to exploit remotely over the network, increasing its risk profile. The absence of patch links suggests that organizations must rely on interim mitigations until an official fix is released.

Potential Impact

For European organizations, the exposure of sensitive system information can have significant consequences, particularly for entities relying on DIGIKENT for critical municipal or governmental functions. Unauthorized access to system details can enable attackers to map network architectures, identify additional vulnerabilities, or harvest credentials, leading to potential data breaches or targeted attacks. Confidentiality breaches may compromise personal data of citizens or sensitive operational information, risking compliance violations under GDPR and other data protection regulations. Although the vulnerability does not directly affect system integrity or availability, the information gained can be leveraged for more damaging attacks, including ransomware or espionage. The ease of exploitation without authentication increases the threat landscape, especially for organizations with externally accessible DIGIKENT interfaces. The lack of current patches means European entities must proactively implement mitigations to reduce exposure. The reputational damage and regulatory penalties from a breach could be substantial, particularly in countries with stringent data protection enforcement.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several targeted mitigations: 1) Restrict network access to DIGIKENT systems by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 2) Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block anomalous access attempts targeting DIGIKENT interfaces. 3) Conduct thorough audits of DIGIKENT configurations to disable any unnecessary services or information disclosures that could be exploited. 4) Employ application-layer gateways or web application firewalls (WAFs) to filter and sanitize incoming requests to DIGIKENT. 5) Increase monitoring and logging of DIGIKENT system access to detect early signs of exploitation attempts. 6) Prepare incident response plans specific to DIGIKENT compromise scenarios. 7) Engage with Vadi Corporate Information Systems Ltd. Co. for timely updates and patches, and plan for rapid deployment once available. 8) Educate IT staff about the vulnerability and encourage vigilance around DIGIKENT system security. These measures go beyond generic advice by focusing on network-level controls, monitoring, and vendor engagement tailored to the DIGIKENT environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-04T13:43:47.685Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c455b4b57a58fa185634b

Added to database: 2/11/2026, 9:01:15 AM

Last enriched: 2/18/2026, 9:59:00 AM

Last updated: 3/28/2026, 5:16:27 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses