The EAI developed by Digiwin has a Privilege Escalation vulnerability, allowing remote attackers with regular privileges to elevate their privileges to administrator level via a specific API.
History

Mon, 21 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 21 Jul 2025 07:00:00 +0000

Type Values Removed Values Added
Description The EAI developed by Digiwin has a Privilege Escalation vulnerability, allowing remote attackers with regular privileges to elevate their privileges to administrator level via a specific API.
Title Digiwin|EAI - Privilege Escalation
Weaknesses CWE-648
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2025-07-21T06:55:35.216Z

Updated: 2025-07-21T15:27:50.375Z

Reserved: 2025-07-08T02:24:27.140Z

Link: CVE-2025-7344

cve-icon Vulnrichment

Updated: 2025-07-21T15:27:26.507Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-21T07:15:24.417

Modified: 2025-07-22T13:06:07.260

Link: CVE-2025-7344

cve-icon Redhat

No data.