CVE-2025-26492
Published: 11 February 2025
Summary
CVE-2025-26492 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Jetbrains Teamcity. Its CVSS base score is 7.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific flaw in TeamCity's Kubernetes connection handling to prevent exposure of sensitive resources.
Mandates secure and documented configuration settings for Kubernetes connections in TeamCity, directly countering improper settings that expose sensitive resources.
Enforces least privilege for high-privilege users (PR:H), limiting their ability to exploit improper Kubernetes settings for confidentiality and integrity impacts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability stems from improper Kubernetes connection settings exposing sensitive resources (CWE-522: Insufficiently Protected Credentials), directly facilitating access to unsecured credentials stored in TeamCity integration settings.
NVD Description
In JetBrains TeamCity before 2024.12.2 improper Kubernetes connection settings could expose sensitive resources
Deeper analysisAI
CVE-2025-26492 is a vulnerability in JetBrains TeamCity versions prior to 2024.12.2, stemming from improper Kubernetes connection settings that could expose sensitive resources. Published on 2025-02-11, it carries a CVSS v3.1 base score of 7.7 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N) and maps to CWE-522.
The vulnerability can be exploited over the network by attackers with high privileges (PR:H), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful attacks enable high confidentiality (C:H) and integrity (I:H) impacts with a changed scope (S:C), allowing exposure and potential modification of sensitive resources tied to Kubernetes connections, but without availability disruption (A:N).
JetBrains addressed the issue in TeamCity 2024.12.2. Additional details on fixes and mitigations are available in the vendor advisory at https://www.jetbrains.com/privacy-security/issues-fixed/.
Details
- CWE(s)