Cyber Posture

CVE-2025-15553

High

Published: 16 March 2026

Published
16 March 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0001 3.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15553 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Truesec Lapswebui. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Broken session expiration in LAPS password UI directly enables local credential disclosure (T1552) leading to privilege escalation (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Deeper analysisAI

CVE-2025-15553 affects Truesec’s LAPSWebUI in versions prior to 2.4, where the logout functionality fails to operate correctly. This vulnerability, tracked under CWE-613 (Insufficient Session Expiration), enables privilege escalation by disclosing local administrator passwords. It carries a CVSS v3.1 base score of 7.1, reflecting local vector access (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality and integrity impacts (C:H/I:H), and no availability impact (A:N). The issue was published on 2026-03-16.

An attacker with physical or logical access to an affected workstation and possessing low-level privileges can exploit the broken logout mechanism. By leveraging this flaw with low complexity and no need for user interaction, the attacker can disclose the local admin password, enabling privilege escalation on the system.

The advisory from Reversec Labs at https://labs.reversec.com/advisories/2026/03/insecure-logout-functionality-in-truesec-lapswebui provides details on the vulnerability. Mitigation requires upgrading to LAPSWebUI version 2.4 or later, which addresses the logout functionality issue.

Details

CWE(s)

Affected Products

truesec
lapswebui
≤ 2.4

CVEs Like This One

CVE-2025-15552Same product: Truesec Lapswebui
CVE-2025-15554Same product: Truesec Lapswebui
CVE-2026-41133Shared CWE-613
CVE-2024-33507Shared CWE-613
CVE-2025-59786Shared CWE-613
CVE-2026-24912Shared CWE-613
CVE-2026-41902Shared CWE-613
CVE-2025-24973Shared CWE-613
CVE-2026-33417Shared CWE-613
CVE-2026-28275Shared CWE-613

References