Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9986: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Vadi Corporate Information Systems Ltd. Co. DIGIKENT

0
High
VulnerabilityCVE-2025-9986cvecve-2025-9986cwe-497
Published: Wed Feb 11 2026 (02/11/2026, 08:34:13 UTC)
Source: CVE Database V5
Vendor/Project: Vadi Corporate Information Systems Ltd. Co.
Product: DIGIKENT

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.

AI-Powered Analysis

AILast updated: 02/11/2026, 09:15:32 UTC

Technical Analysis

CVE-2025-9986 is a vulnerability classified under CWE-497, which involves the exposure of sensitive system information to unauthorized control spheres. This vulnerability affects the DIGIKENT product developed by Vadi Corporate Information Systems Ltd. Co. The issue allows an attacker to remotely access sensitive system information without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality severely (C:H), with limited integrity impact (I:L) and no effect on availability (A:N). The exposure of sensitive information could include system configurations, internal identifiers, or other critical data that could facilitate further attacks or reconnaissance. The affected versions are listed as '0', which likely indicates all current versions up to the date of the report are vulnerable. The vulnerability was reserved in September 2025 and published in February 2026. No patches or known exploits are currently available, but the high CVSS score reflects the potential for significant damage if exploited. The vulnerability's ease of exploitation and lack of required privileges make it a critical concern for organizations relying on DIGIKENT, especially those handling sensitive or regulated data.

Potential Impact

For European organizations, the exposure of sensitive system information can lead to increased risk of targeted attacks, including privilege escalation, lateral movement, and data breaches. Confidentiality breaches could compromise personal data protected under GDPR, leading to regulatory penalties and reputational damage. Public sector entities and critical infrastructure operators using DIGIKENT may face heightened risks of espionage or sabotage. The vulnerability's remote exploitability without authentication increases the attack surface, potentially allowing attackers from outside the network to gain valuable intelligence. This could facilitate subsequent attacks that impact system integrity or availability indirectly. The absence of known exploits currently provides a window for proactive mitigation, but the high severity necessitates urgent attention to prevent exploitation. Organizations in sectors such as government, utilities, and large enterprises using DIGIKENT are particularly vulnerable to operational disruption and compliance risks.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or updates addressing CVE-2025-9986 and apply them immediately upon release. 2. Implement strict network segmentation to isolate DIGIKENT systems from untrusted networks and limit exposure to potential attackers. 3. Restrict external access to DIGIKENT interfaces using firewalls and VPNs, ensuring only authorized personnel can connect. 4. Enhance logging and monitoring around DIGIKENT systems to detect unusual access patterns or data exfiltration attempts. 5. Conduct regular security assessments and penetration testing focused on DIGIKENT deployments to identify and remediate related weaknesses. 6. Train IT and security staff on the specifics of this vulnerability to improve incident detection and response capabilities. 7. Prepare incident response plans that include scenarios involving sensitive information exposure to minimize impact if exploitation occurs. 8. Review and minimize the amount of sensitive information stored or accessible via DIGIKENT to reduce potential leakage. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous activities targeting DIGIKENT. 10. Collaborate with industry peers and national cybersecurity authorities to share threat intelligence related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-04T13:43:47.685Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c455b4b57a58fa185634b

Added to database: 2/11/2026, 9:01:15 AM

Last enriched: 2/11/2026, 9:15:32 AM

Last updated: 2/11/2026, 11:31:43 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats