CVE-2025-41012
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tcman | gim | to 2025-04-01 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in TCMAN GIM v11 version 20250304 allows an unauthenticated attacker to check if a user exists on the system by exploiting the 'pda:userId' and 'pda:newPassword' parameters with the 'soapaction UnlockUser' in the '/WS/PDAWebService.asmx' endpoint.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of user existence information, which can be used by attackers to perform targeted attacks such as user enumeration, potentially leading to further exploitation or compromise of user accounts.