CVE-2025-11862
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-11

Last updated on: 2025-11-11

Assigner: Rockwell Automation

Description
A security issue was discovered within Verve Asset Manager allowing unauthorized read-only users to read, update, and delete users via the API.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-11
Last Modified
2025-11-11
Generated
2026-05-07
AI Q&A
2025-11-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 10 associated CPEs
Vendor Product Version / Range
rockwell_automation verve_asset_manager 1.39
rockwell_automation verve_asset_manager 1.35
rockwell_automation verve_asset_manager 1.33
rockwell_automation verve_asset_manager 1.38
rockwell_automation verve_asset_manager 1.36
rockwell_automation verve_asset_manager 1.40
rockwell_automation verve_asset_manager 1.34
rockwell_automation verve_asset_manager 1.41
rockwell_automation verve_asset_manager 1.42
rockwell_automation verve_asset_manager 1.37
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in Verve Asset Manager allows unauthorized users who only have read-only access to the API to perform unauthorized actions such as reading, updating, and deleting user accounts. This is due to incorrect authorization controls in the software versions 1.33 through 1.42. The issue was discovered internally and is classified as a high-severity security flaw. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access and manipulation of user accounts within Verve Asset Manager. An attacker with read-only API access could read sensitive user information, modify user details, or delete user accounts, potentially disrupting operations and compromising security in industrial control systems. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or network indicators provided for this vulnerability. Detection would likely involve verifying the version of Verve Asset Manager in use (versions 1.33 through 1.42 are affected) and checking for unauthorized API activity related to user account read, update, or deletion actions. Since the vulnerability allows unauthorized API access, monitoring API logs for suspicious user management operations by read-only users may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade Verve Asset Manager to version 1.42 or later, where the vulnerability is fixed. If upgrading is not immediately possible, it is recommended to follow security best practices such as removing any read-only user accounts to reduce risk. Additionally, monitoring and restricting API access and subscribing to Rockwell Automation security alerts for updates are advised. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart