Логотип exploitDog
bind:CVE-2025-4692
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-4692

Количество 2

Количество 2

nvd логотип

CVE-2025-4692

9 месяцев назад

Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-c8jf-qq3r-v2h7

9 месяцев назад

Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-4692

Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.

CVSS3: 6.8
0%
Низкий
9 месяцев назад
github логотип
GHSA-c8jf-qq3r-v2h7

Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.

CVSS3: 6.8
0%
Низкий
9 месяцев назад

Уязвимостей на страницу