CVE-2025-5885
BaseFortify
Publication date: 2025-06-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| konica_minolta | bizhub | 20250202 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-5885 is a Cross-Site Request Forgery (CSRF) vulnerability in the Konica Minolta bizhub printer web interface. It occurs because the web application does not properly verify that requests to perform critical actions, such as deleting user boxes, are intentionally submitted by an authenticated user. This allows an attacker to craft malicious requests that, when triggered by a user, can perform unauthorized actions remotely without proper authorization. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing remote attackers to perform unauthorized actions on the affected Konica Minolta bizhub device, such as deleting user boxes without permission. This compromises the integrity of the system and can disrupt normal operations. The attack can be executed without authentication but requires user interaction, making it moderately easy to exploit. There are no known mitigations, and the exploit is publicly available. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for unauthorized or suspicious HTTP requests to the Konica Minolta bizhub web interface, especially requests targeting the 'User Box List' and actions such as box deletion without proper authentication. Since the vulnerability involves CSRF on the web interface, inspecting web server logs for unexpected POST requests to box deletion endpoints or unusual user box registration/deletion activity may help. Specific commands are not provided in the resources, but using tools like curl or browser developer tools to simulate or observe such requests could assist in detection. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the Konica Minolta bizhub web interface to trusted networks or users, disabling remote access if possible, and monitoring for suspicious activity. Since no known countermeasures or mitigations have been identified and the vulnerability lacks proper CSRF protections, it is suggested to consider replacing the affected product with an alternative. Applying any available firmware updates or vendor patches, if released, would also be advisable. [2]