microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability. This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually. This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.
History

Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Ccn-cert
Ccn-cert microclaudia
Vendors & Products Ccn-cert
Ccn-cert microclaudia

Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 09:30:00 +0000

Type Values Removed Values Added
Description microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability. This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually. This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.
Title Improper Access Control in CCN-CERT microCLAUDIA
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-10-28T09:17:08.128Z

Updated: 2025-10-28T15:35:02.579Z

Reserved: 2025-04-16T09:09:36.724Z

Link: CVE-2025-41090

cve-icon Vulnrichment

Updated: 2025-10-28T13:21:05.880Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-28T10:15:42.573

Modified: 2025-10-30T15:05:32.197

Link: CVE-2025-41090

cve-icon Redhat

No data.