CVE-2025-14038
Unauthorized Access via Misconfigured Istio Gateway in EDB Hybrid Manager
Publication date: 2025-12-15
Last updated on: 2026-02-18
Assigner: EnterpriseDB Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| enterprisedb | hybrid_manager | to 1.3.3 (exc) |
| enterprisedb | hybrid_manager | to 2025.12.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-14038 is a vulnerability in EDB Hybrid Manager caused by a misconfiguration in the Istio Gateway that manages authentication and authorization. This misconfiguration left certain gRPC API endpoints unprotected, allowing unauthenticated attackers with network access to directly invoke these endpoints without any authentication or authorization checks. This can lead to unauthorized access to sensitive data or disruption of service. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an unauthenticated attacker to read potentially sensitive data from the affected gRPC endpoints or cause a denial-of-service by sending malformed data. The attack requires network access and has a high impact on availability, with lower impacts on confidentiality and integrity. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade EDB Hybrid Manager to version 1.3.3 if using the LTS version, or to version 2025.12 if using the Innovation version. This upgrade addresses the misconfiguration in the Istio Gateway that allowed unauthenticated access to certain gRPC endpoints. Upgrading ensures that authentication and authorization are properly enforced on these endpoints, preventing unauthorized access and potential denial-of-service attacks. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.