CVE-2025-11862
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-11
Assigner: Rockwell Automation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rockwell_automation | verve_asset_manager | 1.39 |
| rockwell_automation | verve_asset_manager | 1.35 |
| rockwell_automation | verve_asset_manager | 1.33 |
| rockwell_automation | verve_asset_manager | 1.38 |
| rockwell_automation | verve_asset_manager | 1.36 |
| rockwell_automation | verve_asset_manager | 1.40 |
| rockwell_automation | verve_asset_manager | 1.34 |
| rockwell_automation | verve_asset_manager | 1.41 |
| rockwell_automation | verve_asset_manager | 1.42 |
| rockwell_automation | verve_asset_manager | 1.37 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in Verve Asset Manager allows unauthorized users who only have read-only access to the API to perform unauthorized actions such as reading, updating, and deleting user accounts. This is due to incorrect authorization controls in the software versions 1.33 through 1.42. The issue was discovered internally and is classified as a high-severity security flaw. [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access and manipulation of user accounts within Verve Asset Manager. An attacker with read-only API access could read sensitive user information, modify user details, or delete user accounts, potentially disrupting operations and compromising security in industrial control systems. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or network indicators provided for this vulnerability. Detection would likely involve verifying the version of Verve Asset Manager in use (versions 1.33 through 1.42 are affected) and checking for unauthorized API activity related to user account read, update, or deletion actions. Since the vulnerability allows unauthorized API access, monitoring API logs for suspicious user management operations by read-only users may help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade Verve Asset Manager to version 1.42 or later, where the vulnerability is fixed. If upgrading is not immediately possible, it is recommended to follow security best practices such as removing any read-only user accounts to reduce risk. Additionally, monitoring and restricting API access and subscribing to Rockwell Automation security alerts for updates are advised. [1]