CVE-2025-67279
BaseFortify
Publication date: 2026-01-09
Last updated on: 2026-01-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tim_solution_gmbh | tim_bpm_suite | * |
| tim_solution_gmbh | tim_flow | to 9.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability (CVE-2025-67279) affects TIM Solution GmbH's TIM BPM Suite and TIM FLOW software versions before 9.1.2. It involves the use of a broken or risky cryptographic algorithm, specifically the application storing password hashes using the MD5 hashing algorithm, which is considered weak and insecure. This allows a remote attacker to potentially obtain password hashes and escalate privileges. [2]
How can this vulnerability impact me? :
The vulnerability can allow attackers to obtain password hashes protected by weak MD5 hashing, making it easier for them to crack passwords and escalate privileges within the application. This could lead to unauthorized access to user accounts and sensitive data, compromising the security of the system. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying the presence of TIM BPM Suite or TIM FLOW versions prior to 9.1.2 and checking for password hashes stored using the MD5 algorithm. Since the application stores password hashes in MD5 format, you can inspect the database or configuration files for MD5 hashed passwords. Additionally, monitoring HTTP requests for suspicious activity related to privilege escalation attempts may help. Specific commands are not provided in the resources. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading TIM BPM Suite and TIM FLOW to version 9.1.2 or later, as this version addresses the vulnerability. Additionally, follow security best practices such as those recommended by OWASP, including proper password storage (avoiding weak hashing algorithms like MD5), authorization controls, and SQL injection prevention. The vendor has announced remediation efforts, but independent verification is advised. [2, 1]