CVE-2025-40718
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-10-18
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| quiter | quiter_gateway | to 4.7.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-209 | The product generates an error message that includes sensitive information about its environment, users, or associated data. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Upgrade Quiter Gateway to version 4.7.0 or later, as this version addresses the vulnerability. Additionally, perform post-patch verification and review Apache Tomcat deployment permissions to ensure proper security. [1]
Can you explain this vulnerability to me?
This vulnerability is an improper error handling issue in versions prior to 4.7.0 of Quiter Gateway. It allows an attacker to send malformed payloads that cause the system to generate error messages containing sensitive information.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can cause the system to reveal sensitive information through error messages. This could potentially lead to information disclosure that might aid further attacks or compromise of the system.