Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux
Lynxtechnology
Lynxtechnology twonky Server
Microsoft
Microsoft windows
Vendors & Products Linux
Linux linux
Lynxtechnology
Lynxtechnology twonky Server
Microsoft
Microsoft windows

Wed, 19 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
Title Unauthenticated log access in Twonky Server
Weaknesses CWE-420
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published: 2025-11-19T17:41:36.996Z

Updated: 2025-11-19T18:20:50.718Z

Reserved: 2025-11-17T15:07:40.828Z

Link: CVE-2025-13315

cve-icon Vulnrichment

Updated: 2025-11-19T18:20:47.162Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T18:15:47.843

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-13315

cve-icon Redhat

No data.