CVE-2025-26853
Published: 20 March 2025
Summary
CVE-2025-26853 is a critical-severity Incorrect Authorization (CWE-863) vulnerability in Descor Infocad. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-25 (Reference Monitor).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved authorizations for access to system resources, preventing exploitation of the broken authorization schema by unauthenticated remote attackers.
Requires system access control decisions based on defined policies, addressing the incorrect authorization logic (CWE-863/862) in DESCOR INFOCAD.
Mandates a reference monitor mechanism to mediate and enforce access control policies, mitigating flaws in the application's authorization schema.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Broken authorization (CWE-862/863) in a network-accessible application (AV:N) directly enables remote unauthenticated exploitation for initial access and full system compromise, mapping to T1190: Exploit Public-Facing Application.
NVD Description
DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 has a broken authorization schema.
Deeper analysisAI
CVE-2025-26853 is a critical vulnerability in DESCOR INFOCAD versions 3.5.1 and prior, stemming from a broken authorization schema as indicated by associated CWEs-863 (Incorrect Authorization) and CWE-862 (Missing Authorization). The issue received a perfect CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), highlighting its severity due to network accessibility, low attack complexity, no required privileges or user interaction, and broad impacts across confidentiality, integrity, and availability with a changed scope. It was published on 2025-03-20.
Unauthenticated attackers can exploit this vulnerability remotely over the network with minimal effort, bypassing authorization controls to gain unauthorized access to the affected INFOCAD software. Successful exploitation enables high-impact outcomes, including complete compromise of confidentiality (e.g., data exposure), integrity (e.g., data manipulation), and availability (e.g., denial of service), potentially leading to full system control given the scope change.
Advisories point to mitigation via patching, with the vulnerability fixed in INFOCAD version 3.5.2.0 as detailed in the official changelog. Security practitioners should reference the DESCOR INFOCAD product page and the specific changelog entry on broken authorization schema for deployment guidance and verification.
Details
- CWE(s)