Cyber Posture

CVE-2025-22918

High

Published: 03 February 2025

Published
03 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0023 46.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22918 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly preventing unauthorized admin function use via insecure auto-loaded cookies.

prevent

Applies least privilege to restrict admin functions to only authorized users, mitigating privilege escalation from insecure cookie permissions.

prevent

Explicitly defines and limits actions performable without identification or authentication, blocking unauthenticated admin access enabled by cookies.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote unauthenticated exploitation of a public-facing web interface on Polycom RealPresence Group 500 devices via insecure cookie handling to gain admin access and leak sensitive information, directly mapping to T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Polycom RealPresence Group 500 <=20 has Insecure Permissions due to automatically loaded cookies. This allows for the use of administrator functions, resulting in the leakage of sensitive user information.

Deeper analysisAI

CVE-2025-22918 affects Polycom RealPresence Group 500 devices running version 20 or earlier. The vulnerability stems from insecure permissions caused by automatically loaded cookies, which enable unauthorized access to administrator functions. This issue, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for authentication or user interaction.

Attackers can exploit this vulnerability remotely over the network without privileges. By leveraging the insecure cookie handling, unauthenticated remote actors gain access to admin-level functions, resulting in the leakage of sensitive user information. No integrity or availability impacts are associated with successful exploitation.

Advisories reference a GitHub repository at https://github.com/MinggongKs/Polycom/blob/main/README.md for further details, though specific mitigation or patch information is not detailed in the CVE publication from February 3, 2025.

Details

CWE(s)

CVEs Like This One

CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200
CVE-2026-21532Shared CWE-200
CVE-2025-25975Shared CWE-200
CVE-2026-2262Shared CWE-200
CVE-2026-40584Shared CWE-200
CVE-2026-32098Shared CWE-200

References