Under heavy system utilization a random race condition can occur during authentication or token refresh operation. This flaw allows one user to be granted a token intended for another user, resulting in impersonation until the session is ended. This flaw cannot be intentionally exploited due to the required concurring action by two users. However, if the event occurs a user would be inadvertently exposed to another user’s system rights and data access.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Windriver
Windriver wind River Studio Developer
Vendors & Products Windriver
Windriver wind River Studio Developer

Thu, 11 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
Description Under heavy system utilization a random race condition can occur during authentication or token refresh operation. This flaw allows one user to be granted a token intended for another user, resulting in impersonation until the session is ended. This flaw cannot be intentionally exploited due to the required concurring action by two users. However, if the event occurs a user would be inadvertently exposed to another user’s system rights and data access.
Weaknesses CWE-270
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WindRiver

Published: 2025-09-11T16:46:28.575Z

Updated: 2025-09-11T20:37:54.876Z

Reserved: 2025-02-11T20:11:10.092Z

Link: CVE-2025-26499

cve-icon Vulnrichment

Updated: 2025-09-11T20:37:49.366Z

cve-icon NVD

Status : Received

Published: 2025-09-11T17:15:34.497

Modified: 2025-09-11T17:15:34.497

Link: CVE-2025-26499

cve-icon Redhat

No data.