CVE-2025-14038
Unknown Unknown - Not Provided
Unauthorized Access via Misconfigured Istio Gateway in EDB Hybrid Manager

Publication date: 2025-12-15

Last updated on: 2026-02-18

Assigner: EnterpriseDB Corporation

Description
EDB Hybrid Manager contains a flaw that allows an unauthenticated attacker to directly access certain gRPC endpoints. This could allow an attacker to read potentially sensitive data or possibly cause a denial-of-service by writing malformed data to certain gRPC endpoints. This flaw has been remediated in EDB Hybrid Manager 1.3.3, and customers should consider upgrading to 1.3.3 as soon as possible. The flaw is due to a misconfiguration in the Istio Gateway, which manages authentication and authorization for the affected endpoints. The security policy relies on an explicit definition of required permissions in the Istio Gateway configuration, and the affected endpoints were not defined in the configuration. This allowed requests to bypass both authentication and authorization within a Hybrid Manager service. All versions of Hybrid Manager - LTS should be upgraded to 1.3.3, and all versions of Hybrid Manager - Innovation should be upgraded to 2025.12.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2026-02-18
Generated
2026-05-06
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
enterprisedb hybrid_manager to 1.3.3 (exc)
enterprisedb hybrid_manager to 2025.12.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-14038 is a vulnerability in EDB Hybrid Manager caused by a misconfiguration in the Istio Gateway that manages authentication and authorization. This misconfiguration left certain gRPC API endpoints unprotected, allowing unauthenticated attackers with network access to directly invoke these endpoints without any authentication or authorization checks. This can lead to unauthorized access to sensitive data or disruption of service. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an unauthenticated attacker to read potentially sensitive data from the affected gRPC endpoints or cause a denial-of-service by sending malformed data. The attack requires network access and has a high impact on availability, with lower impacts on confidentiality and integrity. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade EDB Hybrid Manager to version 1.3.3 if using the LTS version, or to version 2025.12 if using the Innovation version. This upgrade addresses the misconfiguration in the Istio Gateway that allowed unauthenticated access to certain gRPC endpoints. Upgrading ensures that authentication and authorization are properly enforced on these endpoints, preventing unauthorized access and potential denial-of-service attacks. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart