CVE-2025-7371
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2025-07-25

Assigner: Okta

Description
Okta On-Premises Provisioning (OPP) agents log certain user data during administrator-initiated password resets. This vulnerability allows an attacker with access to the local servers running OPP agents to retrieve user personal information and temporary passwords created during password reset. You are affected by this vulnerability if the following preconditions are met: Local server running OPP agent with versions >=2.2.1 and <= 2.3.0, and User account has had an administrator-initiated password reset while using the affected versions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2025-07-25
Generated
2026-05-07
AI Q&A
2025-07-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
okta okta_on-premises_provisioning_agent 2.3.1
okta okta_on-premises_provisioning_agent 2.2.1
okta okta_on-premises_provisioning_agent 2.3.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Okta On-Premises Provisioning (OPP) agents versions 2.2.1 to 2.3.0, where certain user data, including temporary passwords created during administrator-initiated password resets, are logged. An attacker with access to the local servers running these OPP agents can retrieve this sensitive information.


How can this vulnerability impact me? :

If an attacker gains access to the local servers running the affected OPP agents, they can obtain personal user information and temporary passwords from password resets. This could lead to unauthorized access to user accounts and potential compromise of sensitive data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your local servers running Okta On-Premises Provisioning (OPP) agents are not using affected versions between 2.2.1 and 2.3.0. Upgrade the OPP agents to a version outside this range that addresses the vulnerability. Additionally, review and secure access to local servers to prevent unauthorized access, especially by limiting who can perform administrator-initiated password resets.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart