CVE-2025-2395
Published: 17 March 2025
Summary
CVE-2025-2395 is a critical-severity Reliance on Cookies without Validation and Integrity Checking (CWE-565) vulnerability in Edetw U-Office Force. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 20.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Explicitly identifies and limits actions allowable without authentication, precluding the vulnerable API endpoint from permitting unauthenticated cookie alteration for admin login.
Enforces approved access authorizations, blocking unauthenticated remote attackers from accessing the API to manipulate cookies and gain administrator privileges.
Requires robust identification and authentication for organizational users, preventing improper authentication bypass via API-driven cookie alteration to impersonate administrators.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables unauthenticated remote exploitation of public-facing app API to manipulate cookies for admin impersonation, directly mapping to T1190 and facilitating T1550.004.
NVD Description
The U-Office Force from e-Excellence has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to use a particular API and alter cookies to log in as an administrator.
Deeper analysisAI
CVE-2025-2395 is an Improper Authentication vulnerability (CWE-565) affecting U-Office Force from e-Excellence. Published on 2025-03-17, it enables unauthenticated remote attackers to exploit a particular API endpoint and alter cookies to gain administrator login access. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its high impact on confidentiality, integrity, and availability.
Unauthenticated remote attackers with network access can exploit this vulnerability without privileges, low attack complexity, or user interaction. Exploitation allows attackers to impersonate administrators by manipulating cookies via the API, potentially enabling full control over the affected system.
Mitigation details are outlined in advisories from TWCERT/CC, available at https://www.twcert.org.tw/en/cp-139-10012-d5bbc-2.html and https://www.twcert.org.tw/tw/cp-132-10011-3de72-1.html.
Details
- CWE(s)