CVE-2024-25011
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-09-18
Assigner: Ericsson
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ericsson | catalog_manager | * |
| ericsson | order_care | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves Ericsson Catalog Manager and Ericsson Order Care APIs not having authentication enabled by default. This means that by default, these APIs do not verify the identity of users or systems accessing them, which can lead to unauthorized access and information disclosure. Authentication checks can be configured to fix this issue.
How can this vulnerability impact me? :
The vulnerability can lead to information disclosure because unauthorized users may access sensitive data through the APIs without authentication. This could expose confidential information and potentially harm the security of systems relying on these APIs.
What immediate steps should I take to mitigate this vulnerability?
Configure authentication checks on Ericsson Catalog Manager and Ericsson Order Care APIs, as authentication is not enabled by default. Enabling authentication will remediate the information disclosure issue.