CVE-2025-8855
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-14

Last updated on: 2025-11-14

Assigner: Computer Emergency Response Team of the Republic of Turkey

Description
Authorization Bypass Through User-Controlled Key, Weak Password Recovery Mechanism for Forgotten Password, Authentication Bypass by Assumed-Immutable Data vulnerability in Optimus Software Brokerage Automation allows Exploiting Trust in Client, Authentication Bypass, Manipulate Registry Information.This issue affects Brokerage Automation: before 1.1.71.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-14
Last Modified
2025-11-14
Generated
2026-05-07
AI Q&A
2025-11-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
optimus brokerage_automation *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-302 The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
CWE-640 The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Optimus Software Brokerage Automation before version 1.1.71 involves authorization bypass through a user-controlled key, a weak password recovery mechanism for forgotten passwords, and authentication bypass by assumed-immutable data. It allows attackers to exploit trust in the client, bypass authentication, and manipulate registry information.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access by bypassing authentication mechanisms, potentially allowing attackers to manipulate registry information and exploit trust in the client. This can result in compromised system integrity and unauthorized actions within the affected software.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart